zoukankan      html  css  js  c++  java
  • C# 爬虫 (var X$4 = [''x5f', 'x2d']) 解密方法

    我最近遇到下面形式的代码,研究一天终于在网上找到下面解码方式:
    仿照地址:https://zhidao.baidu.com/question/199754638031264525.html

    var X$4 = ['x5f', 'x2d', 'x2c', 'x61', 'x62', 'x63', 'x64', 'x65', 'x66', 'x67', 'x68', 'x69', 'x6a', 'x6b',
    'x6c', 'x6d', 'x6e', 'x6f', 'x70', 'x71', 'x72', 'x73', 'x74',
    'x75', 'x76', 'x77', 'x78', 'x79', 'x7a', 'x30', 'x31', 'x32', 'x33', 'x34', 'x35', 'x36', 'x37',
    'x38', 'x39', 'x41', 'x42', 'x43', 'x44', 'x45', 'x46', 'x47', 'x48', 'x49', 'x4a', 'x4b', 'x4c',
    'x4d', 'x4e', 'x4f', 'x50', 'x51', 'x52', 'x53', 'x54', 'x55', 'x56', 'x57', 'x58', 'x59', 'x5a'];

    解密方法:通过新建一个html把下面代码放进去进行解码即可。
    <script>
    var X$4 = ['x5f', 'x2d', 'x2c', 'x61', 'x62', 'x63', 'x64', 'x65', 'x66', 'x67', 'x68', 'x69', 'x6a', 'x6b', 
    'x6c', 'x6d', 'x6e', 'x6f', 'x70', 'x71', 'x72', 'x73', 'x74',
    'x75', 'x76', 'x77', 'x78', 'x79', 'x7a', 'x30', 'x31', 'x32', 'x33', 'x34', 'x35', 'x36', 'x37',
    'x38', 'x39', 'x41', 'x42', 'x43', 'x44', 'x45', 'x46', 'x47', 'x48', 'x49', 'x4a', 'x4b', 'x4c',
    'x4d', 'x4e', 'x4f', 'x50', 'x51', 'x52', 'x53', 'x54', 'x55', 'x56', 'x57', 'x58', 'x59', 'x5a'];

    function decode() 
      {
    var element = document.getElementById('code');
          for (var key in _0xf488) {
    element.value += _0xf488[key] + " ";
      }
      }
    </script>
    <textarea id="code" cols="80" rows="20"></textarea>
    <input type="button" onclick="decode()" value="解码">

    新建个html 文件,复制进去,保存文件,然后用浏览器打开这个文件,点击解码按钮。

    解码成功后显示:("_-,abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ")

  • 相关阅读:
    基于Asp.Net webApi owin oauth2的实现
    动态赋值
    C#生成二维码
    深度学习中反卷积层(转置卷积)引起的棋盘格噪声
    batch normalization 批归一化 --- 一个硬币的两面
    FFMPEG常用命令-格式转换-持续更新中
    [译]CRF和QP的区别
    读懂NCHW和NHWC
    [译]GPUView
    有一次接口设计
  • 原文地址:https://www.cnblogs.com/Jhon-xu/p/8805213.html
Copyright © 2011-2022 走看看