昨天在搜索X-Gorgon算法的时候看到一个老哥写的比较好,具体网址忘了,怕下次找不到了所以发在这里码住,稍作了点改动
代码仅用于学习探讨
1 # -*- coding: utf-8 -*-
2 """
3 X-Gorgon加密算法python版
4 1.时间戳转十六进制
5 2.将时间戳排序俩次,
6 a1 v3 是排序key
7 sprintf(byte_102323F30, "%08x", a1);
8 sprintf(byte_102323F3A, "%08x", v3);
9 3.将url参数用MD5加密一次或俩次根据时间戳&运算
10 4.将第一次排序结果写入前16位地址加一写入(从1插入),隔一位插入,前边拼a1
11 5.将第二次排序结果写入后16位(从0插入)后边拼e1
12 """
13 import requests
14 import hashlib
15 import time
16
17 byteTable1 = "D6 28 3B 71 70 76 BE 1B A4 FE 19 57 5E 6C BC 21 B2 14 37 7D 8C A2 FA 67 55 6A 95 E3 FA 67 78 ED 8E 55 33 89 A8 CE 36 B3 5C D6 B2 6F 96 C4 34 B9 6A EC 34 95 C4 FA 72 FF B8 42 8D FB EC 70 F0 85 46 D8 B2 A1 E0 CE AE 4B 7D AE A4 87 CE E3 AC 51 55 C4 36 AD FC C4 EA 97 70 6A 85 37 6A C8 68 FA FE B0 33 B9 67 7E CE E3 CC 86 D6 9F 76 74 89 E9 DA 9C 78 C5 95 AA B0 34 B3 F2 7D B2 A2 ED E0 B5 B6 88 95 D1 51 D6 9E 7D D1 C8 F9 B7 70 CC 9C B6 92 C5 FA DD 9F 28 DA C7 E0 CA 95 B2 DA 34 97 CE 74 FA 37 E9 7D C4 A2 37 FB FA F1 CF AA 89 7D 55 AE 87 BC F5 E9 6A C4 68 C7 FA 76 85 14 D0 D0 E5 CE FF 19 D6 E5 D6 CC F1 F4 6C E9 E7 89 B2 B7 AE 28 89 BE 5E DC 87 6C F7 51 F2 67 78 AE B3 4B A2 B3 21 3B 55 F8 B3 76 B2 CF B3 B3 FF B3 5E 71 7D FA FC FF A8 7D FE D8 9C 1B C4 6A F9 88 B5 E5"
18
19 def encryption(url):
20 """
21 对参数全部挨个进行md5加密
22 """
23 obj = hashlib.md5() # 先创建一个md5的对象
24 # 写入要加密的字节
25 obj.update(url.encode("UTF-8"))
26 # 获取密文
27 secret = obj.hexdigest()
28 return secret.lower()
29
30 def getXGon(url, stub, cookies):
31 """
32 通过请求数据获取XGon加密字符串
33 """
34 NULL_MD5_STRING = "00000000000000000000000000000000"
35 sb = ""
36 if len(url) < 1:
37 sb = NULL_MD5_STRING
38 else:
39 sb = encryption(url)
40 if len(stub) < 1:
41 sb += NULL_MD5_STRING
42 else:
43 sb += stub
44 if len(cookies) < 1:
45 sb += NULL_MD5_STRING
46 else:
47 sb += encryption(cookies)
48 # 这里没看太懂,先直接给-1试试
49 index = -1
50 # index = cookies.index("sessionid=")
51 if index == -1:
52 sb += NULL_MD5_STRING
53 else:
54 sessionid = cookies[index + 10:]
55 if sessionid.__contains__(';'):
56 endIndex = sessionid.index(';')
57 sessionid = sessionid[:endIndex]
58 sb += encryption(sessionid)
59 return sb
60
61 def input(timeMillis, inputBytes):
62 """
63 对时间戳和XGon加密串进行加工
64 """
65 result = []
66 for i in range(4):
67 if inputBytes[i] < 0:
68 temp = hex(inputBytes[i]) + ''
69 temp = temp[6:]
70 result.append(temp)
71 else:
72 temp = hex(inputBytes[i]) + ''
73 result.append(temp)
74 for i in range(4):
75 result.append("0")
76 for i in range(4):
77 if inputBytes[i + 32] < 0:
78 result.append(hex(inputBytes[i + 32]) + '')[6:]
79 else:
80 result.append(hex(inputBytes[i + 32]) + '')
81 for i in range(4):
82 result.append("0")
83 tempByte = hex(int(timeMillis)) + ""
84 tempByte = tempByte.replace("0x", "")
85 for i in range(4):
86 a = tempByte[i * 2:2 * i + 2]
87 result.append(tempByte[i * 2:2 * i + 2])
88 for i in range(len(result)):
89 result[i] = result[i].replace("0x", "")
90 return result
91
92 def initialize(data):
93 """
94 对加工后的数据进行转码,利用秘钥初始化
95 """
96 myhex = 0
97 byteTable2 = byteTable1.split(" ")
98 for i in range(len(data)):
99 hex1 = 0
100 if i == 0:
101 hex1 = int(byteTable2[int(byteTable2[0], 16) - 1], 16)
102 byteTable2[i] = hex(hex1)
103 # byteTable2[i] = Integer.toHexString(hex1);
104 elif i == 1:
105 temp = int("D6", 16) + int("28", 16)
106 if temp > 256:
107 temp -= 256
108 hex1 = int(byteTable2[temp - 1], 16)
109 myhex = temp
110 byteTable2[i] = hex(hex1)
111 else:
112 temp = myhex + int(byteTable2[i], 16)
113 if temp > 256:
114 temp -= 256
115 hex1 = int(byteTable2[temp - 1], 16)
116 myhex = temp
117 byteTable2[i] = hex(hex1)
118 if hex1 * 2 > 256:
119 hex1 = hex1 * 2 - 256
120 else:
121 hex1 = hex1 * 2
122 hex2 = byteTable2[hex1 - 1]
123 result = int(hex2, 16) ^ int(data[i], 16)
124 data[i] = hex(result)
125 for i in range(len(data)):
126 data[i] = data[i].replace("0x", "")
127 return data
128
129 def handle(data):
130 """
131 对转码后的数据进行替换
132 """
133 for i in range(len(data)):
134 byte1 = data[i]
135 if len(byte1) < 2:
136 byte1 += '0'
137 else:
138 byte1 = data[i][1] + data[i][0]
139 if i < len(data) - 1:
140 byte1 = hex(int(byte1, 16) ^ int(data[i + 1], 16)).replace("0x", "")
141 else:
142 byte1 = hex(int(byte1, 16) ^ int(data[0], 16)).replace("0x", "")
143 byte1 = byte1.replace("0x", "")
144 a = (int(byte1, 16) & int("AA", 16)) / 2
145 a = int(abs(a))
146 byte2 = ((int(byte1, 16) & int("55", 16)) * 2) | a
147 byte2 = ((byte2 & int("33", 16)) * 4) | (int)((byte2 & int("cc", 16)) / 4)
148 byte3 = hex(byte2).replace("0x", "")
149 if len(byte3) > 1:
150 byte3 = byte3[1] + byte3[0]
151 else:
152 byte3 += "0"
153 byte4 = int(byte3, 16) ^ int("FF", 16);
154 byte4 = byte4 ^ int("14", 16)
155 data[i] = hex(byte4).replace("0x", "")
156 return data
157
158 def xGorgon(timeMillis, inputBytes):
159 """
160 时间戳和XGon加密字符串处理,生成最终X-Gorgon参数
161 """
162 data1 = []
163 data1.append("3")
164 data1.append("61")
165 data1.append("41")
166 data1.append("10")
167 data1.append("80")
168 data1.append("0")
169 data2 = input(timeMillis, inputBytes)
170 data2 = initialize(data2)
171 data2 = handle(data2)
172 for i in range(len(data2)):
173 data1.append(data2[i])
174
175 xGorgonStr = ""
176 for i in range(len(data1)):
177 temp = data1[i] + ""
178 if len(temp) > 1:
179 xGorgonStr += temp
180 else:
181 xGorgonStr += "0"
182 xGorgonStr += temp
183 return xGorgonStr
184
185 def strToByte(str):
186 """
187 对XGon加密字符串进行二次转换
188 """
189 length = len(str)
190 str2 = str
191 bArr = []
192 i = 0
193 while i < length:
194 # bArr[i/2] = b'\xff\xff\xff'+(str2hex(str2[i]) << 4+str2hex(str2[i+1])).to_bytes(1, "big")
195 a = str2[i]
196 b = str2[1 + i]
197 c = ((str2hex(a) << 4) + str2hex(b))
198 bArr.append(c)
199 i += 2
200 return bArr
201
202 def str2hex(s):
203 """
204 16进制处理
205 """
206 odata = 0
207 su = s.upper()
208 for c in su:
209 tmp = ord(c)
210 if tmp <= ord('9'):
211 odata = odata << 4
212 odata += tmp - ord('0')
213 elif ord('A') <= tmp <= ord('F'):
214 odata = odata << 4
215 odata += tmp - ord('A') + 10
216 return odata
217
218 if __name__ == "__main__":
219 # 抓包获取请求url
220 url = "https://xxxxx"
221 ts = str(time.time()).split(".")[0]
222 # ts = "1638959449"
223 # _rticket = str(time.time() * 1000).split(".")[0]
224 params = url[url.index('?') + 1:]
225 # 下面两个参数按需填写
226 STUB = ""
227 cookies = ""
228 # 获取gorgon参数
229 s = getXGon(params, STUB, cookies)
230 gorgon = xGorgon(ts, strToByte(s))
231 # 拼请求头
232 headers = {
233 "X-Gorgon": gorgon,
234 # "X-SS-REQ-TICKET": "1585711173953",
235 "X-Khronos": ts,
236 # "sdk-version": "1",
237 # "Accept-Encoding": "gzip",
238 # "X-SS-REQ-TICKET": _rticket,
239 # "User-Agent": "",
240 # "Host": "aweme.snssdk.com",
241 # "Cookie": cookies,
242 # "Connection": "Keep-Alive",
243 # "x-tt-token": "00080ab789c0bf0519740314c59de87d8ace96d49d8ab2afd7a0f09cba0911612f99baf92acae289860e0f84ffd97fc2c344"
244 }
245 resp = requests.get(url, headers=headers)
246 print(resp.text)
247