前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >X-Gorgon算法参数获取(python版,附源码)

X-Gorgon算法参数获取(python版,附源码)

作者头像
汪凡
发布2021-12-10 11:31:19
1.1K0
发布2021-12-10 11:31:19
举报
文章被收录于专栏:python成长之路python成长之路

昨天在搜索X-Gorgon算法的时候看到一个老哥写的比较好,具体网址忘了,怕下次找不到了所以发在这里码住,稍作了点改动

代码仅用于学习探讨

代码语言:javascript
复制
  1 # -*- coding: utf-8 -*-
  2 """
  3 X-Gorgon加密算法python版
  4 1.时间戳转十六进制
  5 2.将时间戳排序俩次,
  6   a1 v3 是排序key
  7   sprintf(byte_102323F30, "%08x", a1);
  8   sprintf(byte_102323F3A, "%08x", v3);
  9 3.将url参数用MD5加密一次或俩次根据时间戳&运算
 10 4.将第一次排序结果写入前16位地址加一写入(从1插入),隔一位插入,前边拼a1
 11 5.将第二次排序结果写入后16位(从0插入)后边拼e1
 12 """
 13 import requests
 14 import hashlib
 15 import time
 16 
 17 byteTable1 = "D6 28 3B 71 70 76 BE 1B A4 FE 19 57 5E 6C BC 21 B2 14 37 7D 8C A2 FA 67 55 6A 95 E3 FA 67 78 ED 8E 55 33 89 A8 CE 36 B3 5C D6 B2 6F 96 C4 34 B9 6A EC 34 95 C4 FA 72 FF B8 42 8D FB EC 70 F0 85 46 D8 B2 A1 E0 CE AE 4B 7D AE A4 87 CE E3 AC 51 55 C4 36 AD FC C4 EA 97 70 6A 85 37 6A C8 68 FA FE B0 33 B9 67 7E CE E3 CC 86 D6 9F 76 74 89 E9 DA 9C 78 C5 95 AA B0 34 B3 F2 7D B2 A2 ED E0 B5 B6 88 95 D1 51 D6 9E 7D D1 C8 F9 B7 70 CC 9C B6 92 C5 FA DD 9F 28 DA C7 E0 CA 95 B2 DA 34 97 CE 74 FA 37 E9 7D C4 A2 37 FB FA F1 CF AA 89 7D 55 AE 87 BC F5 E9 6A C4 68 C7 FA 76 85 14 D0 D0 E5 CE FF 19 D6 E5 D6 CC F1 F4 6C E9 E7 89 B2 B7 AE 28 89 BE 5E DC 87 6C F7 51 F2 67 78 AE B3 4B A2 B3 21 3B 55 F8 B3 76 B2 CF B3 B3 FF B3 5E 71 7D FA FC FF A8 7D FE D8 9C 1B C4 6A F9 88 B5 E5"
 18 
 19 def encryption(url):
 20     """
 21     对参数全部挨个进行md5加密
 22     """
 23     obj = hashlib.md5()  # 先创建一个md5的对象
 24     # 写入要加密的字节
 25     obj.update(url.encode("UTF-8"))
 26     # 获取密文
 27     secret = obj.hexdigest()
 28     return secret.lower()
 29 
 30 def getXGon(url, stub, cookies):
 31     """
 32     通过请求数据获取XGon加密字符串
 33     """
 34     NULL_MD5_STRING = "00000000000000000000000000000000"
 35     sb = ""
 36     if len(url) < 1:
 37         sb = NULL_MD5_STRING
 38     else:
 39         sb = encryption(url)
 40     if len(stub) < 1:
 41         sb += NULL_MD5_STRING
 42     else:
 43         sb += stub
 44     if len(cookies) < 1:
 45         sb += NULL_MD5_STRING
 46     else:
 47         sb += encryption(cookies)
 48     # 这里没看太懂,先直接给-1试试
 49     index = -1
 50     # index = cookies.index("sessionid=")
 51     if index == -1:
 52         sb += NULL_MD5_STRING
 53     else:
 54         sessionid = cookies[index + 10:]
 55         if sessionid.__contains__(';'):
 56             endIndex = sessionid.index(';')
 57             sessionid = sessionid[:endIndex]
 58         sb += encryption(sessionid)
 59     return sb
 60 
 61 def input(timeMillis, inputBytes):
 62     """
 63     对时间戳和XGon加密串进行加工
 64     """
 65     result = []
 66     for i in range(4):
 67         if inputBytes[i] < 0:
 68             temp = hex(inputBytes[i]) + ''
 69             temp = temp[6:]
 70             result.append(temp)
 71         else:
 72             temp = hex(inputBytes[i]) + ''
 73             result.append(temp)
 74     for i in range(4):
 75         result.append("0")
 76     for i in range(4):
 77         if inputBytes[i + 32] < 0:
 78             result.append(hex(inputBytes[i + 32]) + '')[6:]
 79         else:
 80             result.append(hex(inputBytes[i + 32]) + '')
 81     for i in range(4):
 82         result.append("0")
 83     tempByte = hex(int(timeMillis)) + ""
 84     tempByte = tempByte.replace("0x", "")
 85     for i in range(4):
 86         a = tempByte[i * 2:2 * i + 2]
 87         result.append(tempByte[i * 2:2 * i + 2])
 88     for i in range(len(result)):
 89         result[i] = result[i].replace("0x", "")
 90     return result
 91 
 92 def initialize(data):
 93     """
 94     对加工后的数据进行转码,利用秘钥初始化
 95     """
 96     myhex = 0
 97     byteTable2 = byteTable1.split(" ")
 98     for i in range(len(data)):
 99         hex1 = 0
100         if i == 0:
101             hex1 = int(byteTable2[int(byteTable2[0], 16) - 1], 16)
102             byteTable2[i] = hex(hex1)
103             # byteTable2[i] = Integer.toHexString(hex1);
104         elif i == 1:
105             temp = int("D6", 16) + int("28", 16)
106             if temp > 256:
107                 temp -= 256
108             hex1 = int(byteTable2[temp - 1], 16)
109             myhex = temp
110             byteTable2[i] = hex(hex1)
111         else:
112             temp = myhex + int(byteTable2[i], 16)
113             if temp > 256:
114                 temp -= 256
115             hex1 = int(byteTable2[temp - 1], 16)
116             myhex = temp
117             byteTable2[i] = hex(hex1)
118         if hex1 * 2 > 256:
119             hex1 = hex1 * 2 - 256
120         else:
121             hex1 = hex1 * 2
122         hex2 = byteTable2[hex1 - 1]
123         result = int(hex2, 16) ^ int(data[i], 16)
124         data[i] = hex(result)
125     for i in range(len(data)):
126         data[i] = data[i].replace("0x", "")
127     return data
128 
129 def handle(data):
130     """
131     对转码后的数据进行替换
132     """
133     for i in range(len(data)):
134         byte1 = data[i]
135         if len(byte1) < 2:
136             byte1 += '0'
137         else:
138             byte1 = data[i][1] + data[i][0]
139         if i < len(data) - 1:
140             byte1 = hex(int(byte1, 16) ^ int(data[i + 1], 16)).replace("0x", "")
141         else:
142             byte1 = hex(int(byte1, 16) ^ int(data[0], 16)).replace("0x", "")
143         byte1 = byte1.replace("0x", "")
144         a = (int(byte1, 16) & int("AA", 16)) / 2
145         a = int(abs(a))
146         byte2 = ((int(byte1, 16) & int("55", 16)) * 2) | a
147         byte2 = ((byte2 & int("33", 16)) * 4) | (int)((byte2 & int("cc", 16)) / 4)
148         byte3 = hex(byte2).replace("0x", "")
149         if len(byte3) > 1:
150             byte3 = byte3[1] + byte3[0]
151         else:
152             byte3 += "0"
153         byte4 = int(byte3, 16) ^ int("FF", 16);
154         byte4 = byte4 ^ int("14", 16)
155         data[i] = hex(byte4).replace("0x", "")
156     return data
157 
158 def xGorgon(timeMillis, inputBytes):
159     """
160     时间戳和XGon加密字符串处理,生成最终X-Gorgon参数
161     """
162     data1 = []
163     data1.append("3")
164     data1.append("61")
165     data1.append("41")
166     data1.append("10")
167     data1.append("80")
168     data1.append("0")
169     data2 = input(timeMillis, inputBytes)
170     data2 = initialize(data2)
171     data2 = handle(data2)
172     for i in range(len(data2)):
173         data1.append(data2[i])
174 
175     xGorgonStr = ""
176     for i in range(len(data1)):
177         temp = data1[i] + ""
178         if len(temp) > 1:
179             xGorgonStr += temp
180         else:
181             xGorgonStr += "0"
182             xGorgonStr += temp
183     return xGorgonStr
184 
185 def strToByte(str):
186     """
187     对XGon加密字符串进行二次转换
188     """
189     length = len(str)
190     str2 = str
191     bArr = []
192     i = 0
193     while i < length:
194         # bArr[i/2] = b'\xff\xff\xff'+(str2hex(str2[i]) << 4+str2hex(str2[i+1])).to_bytes(1, "big")
195         a = str2[i]
196         b = str2[1 + i]
197         c = ((str2hex(a) << 4) + str2hex(b))
198         bArr.append(c)
199         i += 2
200     return bArr
201 
202 def str2hex(s):
203     """
204     16进制处理
205     """
206     odata = 0
207     su = s.upper()
208     for c in su:
209         tmp = ord(c)
210         if tmp <= ord('9'):
211             odata = odata << 4
212             odata += tmp - ord('0')
213         elif ord('A') <= tmp <= ord('F'):
214             odata = odata << 4
215             odata += tmp - ord('A') + 10
216     return odata
217 
218 if __name__ == "__main__":
219     # 抓包获取请求url
220     url = "https://xxxxx"
221     ts = str(time.time()).split(".")[0]
222     # ts = "1638959449"
223     # _rticket = str(time.time() * 1000).split(".")[0]
224     params = url[url.index('?') + 1:]
225     # 下面两个参数按需填写
226     STUB = ""
227     cookies = ""
228     # 获取gorgon参数
229     s = getXGon(params, STUB, cookies)
230     gorgon = xGorgon(ts, strToByte(s))
231     # 拼请求头
232     headers = {
233         "X-Gorgon": gorgon,
234         # "X-SS-REQ-TICKET": "1585711173953",
235         "X-Khronos": ts,
236         # "sdk-version": "1",
237         # "Accept-Encoding": "gzip",
238         # "X-SS-REQ-TICKET": _rticket,
239         # "User-Agent": "",
240         # "Host": "aweme.snssdk.com",
241         # "Cookie": cookies,
242         # "Connection": "Keep-Alive",
243         # "x-tt-token": "00080ab789c0bf0519740314c59de87d8ace96d49d8ab2afd7a0f09cba0911612f99baf92acae289860e0f84ffd97fc2c344"
244     }
245     resp = requests.get(url, headers=headers)
246     print(resp.text)
247  
本文参与 腾讯云自媒体分享计划,分享自作者个人站点/博客。
原始发表:2021-12-09 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体分享计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档