zoukankan      html  css  js  c++  java
  • LoadRunner的Capture Level

    场景:录制loadrunner的web站点

    问题:录制的过程中发现除了页面正常的请求外还有些看不懂的请求(包含乱码),脚本如下:

        web_url("WebTours", 
            "URL=http://127.0.0.1:1080/WebTours/", 
            "Resource=0", 
            "RecContentType=text/html", 
            "Referer=", 
            "Snapshot=t14.inf", 
            "Mode=HTML", 
            EXTRARES, 
            "Url=http://act.cmcmcdn.com/upload/201507/8afc2fe48db9060fe1bdda2089e1d950.png", ENDITEM, 
            "Url=http://act.cmcmcdn.com/upload/201507/3b491068507d8f85ea7b35d756da7215.png", ENDITEM, 
            LAST);
    
        web_url("config.xml", 
            "URL=http://bho.xl7.xunlei.com/platform/2.5.x.xxxx/config.xml", 
            "Resource=0", 
            "RecContentType=text/xml", 
            "Referer=", 
            "Snapshot=t15.inf", 
            "Mode=HTML", 
            LAST);
    
        web_custom_request("q.cgi", 
            "URL=http://masterconn.qq.com/q.cgi", 
            "Method=POST", 
            "Resource=1", 
            "Referer=", 
            "Snapshot=t16.inf", 
            "EncType=", 
            "BodyBinary=\x00\x02\x01@\x00\x00\x00\x04\x00\x00\x00\xEA\x00\x00\x07\xDA\x19\x9E\x18\x08U\xB3\x13\xC8*蘬\x1F\xB47偰\x14S塦\x00\x00\x00\x04\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00	僬筈鸯GT聍8T\x98'\x13绶鈳0戨\x07櫬\xEC\x1Ey
    \x13[\x9F\x1A忍Q�擬\x13谈]⒍剐ncj�\x04\xFFw#扊G{\xA7\x1A蠍個g:砇绪l鳮\xFB\x7F\x101珥剓聺桇=88bY郔\xB1\x0B&_\x8F\x1F\x7F
    泛|紥|\xC1
    "
            "l縝V3趔鵔	K茦X\x18扨窲詃\x1F蟎\x1B#弩\xFE\x16茎覚S2,\xC6\x1C姷涖uJp穘訫bi曼\\\x08", 
            LAST);
    
        return 0;

    上面的脚本中出了第一个是期望内的,其他的出现的很莫名其妙,为此笔者查阅了相关资料,发现Record Options--NetWork--Port Mapping中的

    Capture Level默认选中的为Socket level data,而关于Capture Level有这么一段解释:

    1、Socket level data.
    Capture data using trapping on the socket level only. Port mappings apply in this case (default).
    2、WinINet level data.
    Capture data using hooks on the WinINet.dll API used by certain HTTP applications. The most common application that uses these hooks is Internet Explorer. Port mappings are not relevant for this level.
    3、Socket level and WinINet level data.
    Captures data using both mechanisms. WinINet level sends information for applications that use WinINet.dll. Socket level sends data only if it determines that it did not originate from WinINet.dll. Port mapping applies to data that did not originate from WinINet.dll.

    抱着试试看的心里,笔者把Capture Level修改成WinINet level data,发现脚本中莫名奇妙的内容果然不见了╰( ̄▽ ̄)╮

    Action()
    {
    
        web_url("WebTours", 
            "URL=http://127.0.0.1:1080/WebTours/", 
            "Resource=0", 
            "RecContentType=text/html", 
            "Referer=", 
            "Snapshot=t13.inf", 
            "Mode=HTML", 
            EXTRARES, 
            "Url=../favicon.ico", "Referer=", ENDITEM, 
            "Url=https://ieonline.microsoft.com/favicon.ico", "Referer=", ENDITEM, 
            LAST);
    
        return 0;
    }
  • 相关阅读:
    基于域名的虚拟主机
    用户认证
    部署lnmp
    django开发流程
    sed 和awk的执行方式
    将文本行倒序排列
    《深入理解JAVA虚拟机》----------第二章 JAVA内存区域与内存溢出异常,笔记(上)
    《深入理解JAVA虚拟机》----------第三章 垃圾收集器与内存分配策略,笔记(下)
    《深入理解JAVA虚拟机》----------第三章 垃圾收集器与内存分配策略,笔记(上)
    洛谷P3783 [SDOI2017]天才黑客(前后缀优化建图+虚树+最短路)
  • 原文地址:https://www.cnblogs.com/changshuo/p/4767924.html
Copyright © 2011-2022 走看看