小红书web端cookie信息生成

小红书web端的cookie包含4个参数:xhsTrackerId, extra_exp_ids, timestamp2, timestamp2.sig。
前面两个参数直接携带请求小红书主页即可获取,后两个需要携带data两个参数做post请求获取。
在这里插入图片描述
如上图,id是经由sign字符加密而来,sign是由UA、版本号、还有一些不知何物的字符拼接组成。下面是抠出来的js代码,用以填入sign生成id

function get_id() {
    for (y = function(t) {
        for (var e, n = t.length, r = n + 8, o = 16 * ((r - r % 64) / 64 + 1), i = Array(o - 1), a = 0, c = 0; c < n;)
        a = c % 4 * 8,
        i[e = (c - c % 4) / 4] = i[e] | t.charCodeAt(c) << a,
        c++;
        return a = c % 4 * 8,
        i[e = (c - c % 4) / 4] = i[e] | 128 << a,
        i[o - 2] = n << 3,
        i[o - 1] = n >>> 29,
        i
    }(function(t) {
        t = t.replace(/\r\n/g, "\n");
        for (var e = "", n = 0; n < t.length; n++) {
            var r = t.charCodeAt(n);
            r < 128 ? e += String.fromCharCode(r) : (127 < r && r < 2048 ? e += String.fromCharCode(r >> 6 | 192) : (e += String.fromCharCode(r >> 12 | 224),
            e += String.fromCharCode(r >> 6 & 63 | 128)),
            e += String.fromCharCode(63 & r | 128))
        }
        return e
    }("Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36~~~false~~~zh-CN~~~24~~~8~~~4~~~-480~~~Asia/Taipei~~~1~~~1~~~1~~~1~~~unknown~~~Win32~~~PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Chrome PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Chromium PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Microsoft Edge PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,WebKit built-in PDF::Portable Document Format::application/pdf~pdf,text/pdf~pdf~~~canvas winding:yes~canvas fp:10cfbbb02b2606dbc2ccb15a3cd2b558~~~false~~~false~~~false~~~false~~~false~~~0;false;false~~~4;7;8~~~124.04347527516074hasaki")),
    d = 1732584193,
    v = 4023233417,
    h = 2562383102,
    g = 271733878,
    a = 0;
    a < y.length;
    a += 16)
    d = o(d = r(d = r(d = r(d = r(d = n(d = n(d = n(d = n(d = e(d = e(d = e(d = e(s = d, f = v, l = h, p = g, y[a + 0], 7, 3614090360), v = e(v, h = e(h, g = e(g, d, v, h, y[a + 1], 12, 3905402710), d, v, y[a + 2], 17, 606105819), g, d, y[a + 3], 22, 3250441966), h, g, y[a + 4], 7, 4118548399), v = e(v, h = e(h, g = e(g, d, v, h, y[a + 5], 12, 1200080426), d, v, y[a + 6], 17, 2821735955), g, d, y[a + 7], 22, 4249261313), h, g, y[a + 8], 7, 1770035416), v = e(v, h = e(h, g = e(g, d, v, h, y[a + 9], 12, 2336552879), d, v, y[a + 10], 17, 4294925233), g, d, y[a + 11], 22, 2304563134), h, g, y[a + 12], 7, 1804603682), v = e(v, h = e(h, g = e(g, d, v, h, y[a + 13], 12, 4254626195), d, v, y[a + 14], 17, 2792965006), g, d, y[a + 15], 22, 1236535329), h, g, y[a + 1], 5, 4129170786), v = n(v, h = n(h, g = n(g, d, v, h, y[a + 6], 9, 3225465664), d, v, y[a + 11], 14, 643717713), g, d, y[a + 0], 20, 3921069994), h, g, y[a + 5], 5, 3593408605), v = n(v, h = n(h, g = n(g, d, v, h, y[a + 10], 9, 38016083), d, v, y[a + 15], 14, 3634488961), g, d, y[a + 4], 20, 3889429448), h, g, y[a + 9], 5, 568446438), v = n(v, h = n(h, g = n(g, d, v, h, y[a + 14], 9, 3275163606), d, v, y[a + 3], 14, 4107603335), g, d, y[a + 8], 20, 1163531501), h, g, y[a + 13], 5, 2850285829), v = n(v, h = n(h, g = n(g, d, v, h, y[a + 2], 9, 4243563512), d, v, y[a + 7], 14, 1735328473), g, d, y[a + 12], 20, 2368359562), h, g, y[a + 5], 4, 4294588738), v = r(v, h = r(h, g = r(g, d, v, h, y[a + 8], 11, 2272392833), d, v, y[a + 11], 16, 1839030562), g, d, y[a + 14], 23, 4259657740), h, g, y[a + 1], 4, 2763975236), v = r(v, h = r(h, g = r(g, d, v, h, y[a + 4], 11, 1272893353), d, v, y[a + 7], 16, 4139469664), g, d, y[a + 10], 23, 3200236656), h, g, y[a + 13], 4, 681279174), v = r(v, h = r(h, g = r(g, d, v, h, y[a + 0], 11, 3936430074), d, v, y[a + 3], 16, 3572445317), g, d, y[a + 6], 23, 76029189), h, g, y[a + 9], 4, 3654602809), v = r(v, h = r(h, g = r(g, d, v, h, y[a + 12], 11, 3873151461), d, v, y[a + 15], 16, 530742520), g, d, y[a + 2], 23, 3299628645), h, g, y[a + 0], 6, 4096336452),
    v = o(v = o(v = o(v = o(v, h = o(h, g = o(g, d, v, h, y[a + 7], 10, 1126891415), d, v, y[a + 14], 15, 2878612391), g, d, y[a + 5], 21, 4237533241), h = o(h, g = o(g, d = o(d, v, h, g, y[a + 12], 6, 1700485571), v, h, y[a + 3], 10, 2399980690), d, v, y[a + 10], 15, 4293915773), g, d, y[a + 1], 21, 2240044497), h = o(h, g = o(g, d = o(d, v, h, g, y[a + 8], 6, 1873313359), v, h, y[a + 15], 10, 4264355552), d, v, y[a + 6], 15, 2734768916), g, d, y[a + 13], 21, 1309151649), h = o(h, g = o(g, d = o(d, v, h, g, y[a + 4], 6, 4149444226), v, h, y[a + 11], 10, 3174756917), d, v, y[a + 2], 15, 718787259), g, d, y[a + 9], 21, 3951481745),
    d = u(d, s),
    v = u(v, f),
    h = u(h, l),
    g = u(g, p);
    return (i(d) + i(v) + i(h) + i(g)).toLowerCase()
}

function u(t, e) {
    var n, r, o, i, a;
    return o = 2147483648 & t,
    i = 2147483648 & e,
    a = (1073741823 & t) + (1073741823 & e), (n = 1073741824 & t) & (r = 1073741824 & e) ? 2147483648 ^ a ^ o ^ i : n | r ? 1073741824 & a ? 3221225472 ^ a ^ o ^ i : 1073741824 ^ a ^ o ^ i : a ^ o ^ i
}

function i(t) {
    var e, n = "",
        r = "";
    for (e = 0; e <= 3; e++)
    n += (r = "0" + (t >>> 8 * e & 255).toString(16)).substr(r.length - 2, 2);
    return n
}

function o(t, e, n, r, o, i, a) {
    return u(c(t = u(t, u(u(n ^ (e | ~r), o), a)), i), e)
}

function e(t, e, n, r, o, i, a) {
    return u(c(t = u(t, u(u(e & n | ~e & r, o), a)), i), e)
}

function n(t, e, n, r, o, i, a) {
    return u(c(t = u(t, u(u(e & r | n & ~r, o), a)), i), e)
}

function r(t, e, n, r, o, i, a) {
    return u(c(t = u(t, u(u(e ^ n ^ r, o), a)), i), e)
}

function c(t, e) {
    return t << e | t >>> 32 - e
}

执行get_id函数即可得到加密结果
在这里插入图片描述
其实id跟sign写死也可以,哈哈哈。贴个python代码

def get_xhs_cookie(proxies):
    url = 'https://www.xiaohongshu.com'
    headers = {
        'user-agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36',
    }
    xhs_cookie = ''
    res = requests.get(url, headers=headers, verify=False, proxies=proxies, timeout=10)
    cookies = res.headers['Set-Cookie'].split(';')
    for cookie in cookies:
        re_str1 = re.search('xhsTrackerId', cookie)
        re_str2 = re.search('extra_exp_ids', cookie)
        if re_str1 or re_str2:
            xhs_cookie += cookie
            xhs_cookie += ';'
    url = 'https://www.xiaohongshu.com/fe_api/burdock/v2/shield/registerCanvas?p=cc'
    headers = {
        'Cookie': xhs_cookie,
        'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36',
    }
    print(xhs_cookie)
        data = {
        'id': "79c4bb50cddbc552b754f642f33a220b",
        'sign': "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36~~~false~~~zh-CN~~~24~~~8~~~4~~~-480~~~Asia/Taipei~~~1~~~1~~~1~~~1~~~unknown~~~Win32~~~PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Chrome PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Chromium PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Microsoft Edge PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,WebKit built-in PDF::Portable Document Format::application/pdf~pdf,text/pdf~pdf~~~canvas winding:yes~canvas fp:10cfbbb02b2606dbc2ccb15a3cd2b558~~~false~~~false~~~false~~~false~~~false~~~0;false;false~~~4;7;8~~~124.04347527516074"        # 'sign':"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:6.0) Gecko/20100101 Firefox/6.0~~~false~~~zh-CN~~~24~~~8~~~4~~~-480~~~Asia/Taipei~~~1~~~1~~~1~~~1~~~unknown~~~Win32~~~PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Chrome PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Chromium PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,Microsoft Edge PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf,WebKit built-in PDF::Portable Document Format::application/pdf~pdf,text/pdf~pdf~~~canvas winding:yes~canvas fp:10cfbbb02b2606dbc2ccb15a3cd2b558~~~false~~~false~~~false~~~false~~~false~~~0;false;false~~~4;7;8~~~124.04347527516074hasaki"
    }
    res = requests.post(url, headers=headers, data=data, verify=False, proxies=proxies, timeout=10)
    cookies = res.headers['Set-Cookie'].split(';')
    for cookie in cookies:
        re_str1 = re.search('timestamp2', cookie)
        if re_str1:
            xhs_cookie += cookie
            xhs_cookie += ';'
    print(xhs_cookie)
    return xhs_cookie

代码加了代理,工作需要。不想要可以直接去掉代理,但小红书web端爬多了也会弹滑块,最简单的方法就是挂代理去执行生成过程。

  • 4
    点赞
  • 19
    收藏
    觉得还不错? 一键收藏
  • 3
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值