import requests import re import time import json import random import datetime import base64 import threading import ssl import execjs import os import sys from bs4 import BeautifulSoup from Crypto.PublicKey import RSA from Crypto.Cipher import PKCS1_v1_5 from Crypto.Cipher import DES3 from Crypto.Util.Padding import pad, unpad from Crypto.Util.strxor import strxor from Crypto.Cipher import AES from http import cookiejar # Python 2: import cookielib as cookiejar from requests.adapters import HTTPAdapter from requests.packages.urllib3.util.ssl_ import create_urllib3_context from tools.notify import send class BlockAll(cookiejar.CookiePolicy): return_ok = set_ok = domain_return_ok = path_return_ok = lambda self, *args, **kwargs: False netscape = True rfc2965 = hide_cookie2 = False def printn(m): print(f'\n{m}') ORIGIN_CIPHERS = ('DEFAULT@SECLEVEL=1') ip_list = [] class DESAdapter(HTTPAdapter): def __init__(self, *args, **kwargs): """ A TransportAdapter that re-enables 3DES support in Requests. """ CIPHERS = ORIGIN_CIPHERS.split(':') random.shuffle(CIPHERS) CIPHERS = ':'.join(CIPHERS) self.CIPHERS = CIPHERS + ':!aNULL:!eNULL:!MD5' super().__init__(*args, **kwargs) def init_poolmanager(self, *args, **kwargs): context = create_urllib3_context(ciphers=self.CIPHERS) kwargs['ssl_context'] = context return super(DESAdapter, self).init_poolmanager(*args, **kwargs) def proxy_manager_for(self, *args, **kwargs): context = create_urllib3_context(ciphers=self.CIPHERS) kwargs['ssl_context'] = context return super(DESAdapter, self).proxy_manager_for(*args, **kwargs) requests.packages.urllib3.disable_warnings() ssl_context = ssl.create_default_context() ssl_context.check_hostname = False ssl_context.verify_mode = ssl.CERT_NONE ssl_context.set_ciphers('DEFAULT@SECLEVEL=0') ss = requests.session() ss.ssl = ssl_context ss.headers = { "User-Agent": "Mozilla/5.0 (Linux; Android 13; 22081212C Build/TKQ1.220829.002) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.97 Mobile Safari/537.36", "Referer": "https://wapact.189.cn:9001/JinDouMall/JinDouMall_independentDetails.html"} ss.mount('https://', DESAdapter()) yc = 0.1 wt = 0 kswt = -3 yf = datetime.datetime.now().strftime("%Y%m") data = {} dirsize = 0 try: with open('权益id.log') as fr: data1 = fr.read() dirsize = len(data1) data = eval(data1) except: with open('权益id.log', 'w') as f: pass yf = datetime.datetime.now().strftime("%Y%m") dd = datetime.datetime.now().strftime("%d") # dd = '01' def getId(phone,ck,session,ticket): # global data if yf not in data: data[yf] = {} str1 = get_level(phone,ck,ticket,session) str2 = str1.split('#') # print(str2) for i in range(0, 3): data[yf][f'{i + 4}'] = str2[i] def get_level(phone,ck,ticket,session): try: bd = js.call('main').split('=') ck[bd[0]] = bd[1] sign = getSign(ticket, session) new_header = { "User-Agent": f"CtClient;9.6.1;Android;12;SM-G9860;{base64.b64encode(phone[5:11].encode()).decode().strip('=+')}!#!{base64.b64encode(phone[0:5].encode()).decode().strip('=+')}", "Referer": "https://wapside.189.cn:9001/resources/dist/signInActivity.html", "sign": sign} session.headers.update(new_header) body = {"para": encrypt_para(f'{{"phone":{phone}}}')} str1 = session.post("https://wapside.189.cn:9001/jt-sign/paradise/getLevelRightsList", json=body, cookies=ck).text right_list_json = json.loads(str1) printn(right_list_json) rightsId = '' levelStr = ['V4','V5','V6'] for str in levelStr: # right_list = self.req(url, "POST", body)[f"{str}"] # right_list = requests.post("https://wapside.189.cn:9001/jt-sign/paradise/getLevelRightsList",json=body,cookies=ck).json() # printn(right_list[f'{str}']) right_list1 = right_list_json[f'{str}'] for data in right_list1: # print(dumps(data, indent=2, ensure_ascii=0)) if "话费" in data["righstName"]: rightsId += f'{data["id"]}#' print(rightsId) return rightsId except Exception as e: print(e) wxp = {} errcode = { "0": "兑换成功", "412": "兑换次数已达上限", "413": "商品已兑完", "420": "未知错误", "410": "该活动已失效~", "Y0001": "当前等级不足,去升级兑当前话费", "Y0002": "使用翼相连网络600分钟或连接并拓展网络500分钟可兑换此奖品", "Y0003": "使用翼相连共享流量400M或共享WIFI:2GB可兑换此奖品", "Y0004": "使用翼相连共享流量2GB可兑换此奖品", "Y0005": "当前等级不足,去升级兑当前话费", "E0001": "您的网龄不足10年,暂不能兑换" } # 加密参数 key = b'1234567`90koiuyhgtfrdews' iv = 8 * b'\0' public_key_b64 = '''-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDBkLT15ThVgz6/NOl6s8GNPofdWzWbCkWnkaAm7O2LjkM1H7dMvzkiqdxU02jamGRHLX/ZNMCXHnPcW/sDhiFCBN18qFvy8g6VYb9QtroI09e176s+ZCtiv7hbin2cCTj99iUpnEloZm19lwHyo69u5UMiPMpq0/XKBO8lYhN/gwIDAQAB -----END PUBLIC KEY-----''' public_key_data = '''-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC+ugG5A8cZ3FqUKDwM57GM4io6JGcStivT8UdGt67PEOihLZTw3P7371+N47PrmsCpnTRzbTgcupKtUv8ImZalYk65dU8rjC/ridwhw9ffW2LBwvkEnDkkKKRi2liWIItDftJVBiWOh17o6gfbPoNrWORcAdcbpk2L+udld5kZNwIDAQAB -----END PUBLIC KEY-----''' def t(h): date = datetime.datetime.now() date_zero = datetime.datetime.now().replace(year=date.year, month=date.month, day=date.day, hour=h, minute=59, second=55) date_zero_time = int(time.mktime(date_zero.timetuple())) return date_zero_time def encrypt(text): cipher = DES3.new(key, DES3.MODE_CBC, iv) ciphertext = cipher.encrypt(pad(text.encode(), DES3.block_size)) return ciphertext.hex() def decrypt(text): ciphertext = bytes.fromhex(text) cipher = DES3.new(key, DES3.MODE_CBC, iv) plaintext = unpad(cipher.decrypt(ciphertext), DES3.block_size) return plaintext.decode() def b64(plaintext): public_key = RSA.import_key(public_key_b64) cipher = PKCS1_v1_5.new(public_key) ciphertext = cipher.encrypt(plaintext.encode()) return base64.b64encode(ciphertext).decode() def encrypt_para(plaintext): public_key = RSA.import_key(public_key_data) cipher = PKCS1_v1_5.new(public_key) ciphertext = cipher.encrypt(plaintext.encode()) return ciphertext.hex() def encode_phone(text): encoded_chars = [] for char in text: encoded_chars.append(chr(ord(char) + 2)) return ''.join(encoded_chars) def ophone(t): key = b'34d7cb0bcdf07523' utf8_key = key.decode('utf-8') utf8_t = t.encode('utf-8') cipher = AES.new(key, AES.MODE_ECB) ciphertext = cipher.encrypt(pad(utf8_t, AES.block_size)) return ciphertext.hex() # def send(uid,content): # r = requests.post('https://wxpusher.zjiecode.com/api/send/message',json={"appToken":"AT_3hr0wdZn5QzPNBbpTHFXawoDIsSUmPkN","content":content,"contentType":1,"uids":[uid]}).json() # return r def userLoginNormal(phone, password): alphabet = 'abcdef0123456789' uuid = [''.join(random.sample(alphabet, 8)), ''.join(random.sample(alphabet, 4)), '4' + ''.join(random.sample(alphabet, 3)), ''.join(random.sample(alphabet, 4)), ''.join(random.sample(alphabet, 12))] timestamp = datetime.datetime.now().strftime("%Y%m%d%H%M%S") loginAuthCipherAsymmertric = 'iPhone 14 15.4.' + uuid[0] + uuid[1] + phone + timestamp + password[:6] + '0$$$0.' r = ss.post('https://appgologin.189.cn:9031/login/client/userLoginNormal', json={ "headerInfos": {"code": "userLoginNormal", "timestamp": timestamp, "broadAccount": "", "broadToken": "", "clientType": "#9.6.1#channel50#iPhone 14 Pro Max#", "shopId": "20002", "source": "110003", "sourcePassword": "Sid98s", "token": "", "userLoginName": phone}, "content": {"attach": "test", "fieldData": { "loginType": "4", "accountType": "", "loginAuthCipherAsymmertric": b64( loginAuthCipherAsymmertric), "deviceUid": uuid[0] + uuid[1] + uuid[2], "phoneNum": encode_phone( phone), "isChinatelecom": "0", "systemVersion": "15.4.0", "authentication": password}}}).json() l = r['responseData']['data']['loginSuccessResult'] if l: load_token[phone] = l with open(load_token_file, 'w') as f: json.dump(load_token, f) ticket = get_ticket(phone, l['userId'], l['token']) return ticket return False def get_ticket(phone, userId, token): r = ss.post('https://appgologin.189.cn:9031/map/clientXML', data='getSingle' + datetime.datetime.now().strftime( "%Y%m%d%H%M%S") + '#9.6.1#channel50#iPhone 14 Pro Max#20002110003Sid98s' + token + '' + phone + 'test' + encrypt( userId) + '4a6862274835b451', headers={'user-agent': 'CtClient;10.4.1;Android;13;22081212C;NTQzNzgx!#!MTgwNTg1'}) # printn(phone, '获取ticket', re.findall('(.*?)',r.text)[0]) tk = re.findall('(.*?)', r.text) if len(tk) == 0: return False return decrypt(tk[0]) def queryInfo(phone, s): global rs a = 1 while a < 10: if rs: bd = js.call('main').split('=') ck[bd[0]] = bd[1] r = s.get('https://wapact.189.cn:9001/gateway/golden/api/queryInfo', cookies=ck).json() try: printn(f'{phone} 金豆余额 {r["biz"]["amountTotal"]}') amountTotal = r["biz"]["amountTotal"] except: amountTotal = 0 if amountTotal < 3000: if rs == 1: bd = js.call('main').split('=') ck[bd[0]] = bd[1] res = s.post('http://wapact.189.cn:9000/gateway/stand/detail/exchange', json={"activityId": jdaid}, cookies=ck).text if '$_ts=window' in res: first_request() rs = 1 time.sleep(3) else: return r a += 1 return r def getSign(ticket,session): try: bd = js.call('main').split('=') ck[bd[0]] = bd[1] response_data = session.get('https://wappark.189.cn/jt-sign/ssoHomLogin?ticket=' + ticket, cookies=ck) response_data = response_data.json() if response_data.get('resoultCode') == '0': sign = response_data.get('sign') return sign else: print(f"获取sign失败[{response_data.get('resoultCode')}]: {response_data}") except Exception as e: print(e) return None def level_ex(phone, rightsId,session,ck): # self.get_level() try: bd = js.call('main').split('=') ck[bd[0]] = bd[1] now = datetime.datetime.now().strftime('%H:%M:%S.%f') url = "https://wappark.189.cn/jt-sign/paradise/conversionRights" data = {"para": encrypt_para(f'{{"phone":{phone},"rightsId":"{rightsId}"}},"receiveCount":1')} response = session.post('https://wappark.189.cn/jt-sign/paradise/conversionRights', json=data,cookies=ck) print(f'{now}--Phone:{phone}--{response.text}') except Exception as e: print(e) def getParadiseInfo(phone, session): try: bd = js.call('main').split('=') ck[bd[0]] = bd[1] url = "https://wappark.189.cn/jt-sign/paradise/getParadiseInfo" data = {"para": encrypt_para(f'{{"phone":{phone}}}')} response = session.post(url, json=data, cookies=ck) # printn(f'{phone[-4:]}=='+response.text) resp = json.loads(response.text) level = resp["userInfo"]["levelInfoMap"]["level"] jy = resp["userInfo"]["levelInfoMap"]["growthValue"] printn(f'等级:{level},经验:{jy}') return level, jy except Exception as e: print(e) def aes_ecb_encrypt(plaintext, key): key = key.encode('utf-8') if len(key) not in [16, 24, 32]: raise ValueError("密钥长度必须为16/24/32字节") # 对明文进行PKCS7填充 padded_data = pad(plaintext.encode('utf-8'), AES.block_size) #padded_data = plaintext.encode('utf-8') # 创建AES ECB加密器 cipher = AES.new(key, AES.MODE_ECB) # 加密并返回Base64编码结果 ciphertext = cipher.encrypt(padded_data) return base64.b64encode(ciphertext).decode('utf-8') def ks(phone, ticket,level, uid): global wt wxp[phone] = uid s = requests.session() s.headers = { "User-Agent": "Mozilla/5.0 (Linux; Android 13; 22081212C Build/TKQ1.220829.002) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.97 Mobile Safari/537.36", "Referer": "https://wapact.189.cn:9001/JinDouMall/JinDouMall_independentDetails.html"} s.cookies.set_policy(BlockAll()) s.mount('https://', DESAdapter()) s.timeout = 30 if rs: bd = js.call('main').split('=') ck[bd[0]] = bd[1] data2 = aes_ecb_encrypt(json.dumps( {"ticket": ticket, "backUrl": "https%3A%2F%2Fwapact.189.cn%3A9001", "platformCode": "P201010301", "loginType": 2}), 'telecom_wap_2018') login = ss.post('https://wapact.189.cn:9001/unified/user/login', data=data2, headers={"Content-Type": "application/json;charset=UTF-8", "Accept": "application/json, text/javascript, */*; q=0.01"}, cookies=ck).json() if login['code'] == 0: printn(phone + " 获取token成功") s.headers["Authorization"] = "Bearer " + login["biz"]["token"] queryInfo(phone, s) if rs: sign = getSign(ticket, s) new_header = { "User-Agent": f"CtClient;9.6.1;Android;12;SM-G9860;{base64.b64encode(phone[5:11].encode()).decode().strip('=+')}!#!{base64.b64encode(phone[0:5].encode()).decode().strip('=+')}", "Referer": "https://wapside.189.cn:9001/resources/dist/signInActivity.html", "sign": sign} s.headers.update(new_header) if dd == '01' or dirsize == 0: getId(phone,ck,s,ticket) with open('权益id.log', 'w') as f: f.write(json.dumps(data)) print('再跑一次脚本') rightsId = data[yf][level] ll, jy = getParadiseInfo(phone, s) msg = f'{phone[-4:]}:云宝等级:{ll},经验值:{jy}\n' printn(msg) start_time = time.time() while 1 == 1: current_time = time.time() try: level_ex(phone,rightsId,s,ck) except Exception as e: print(f"请求发送失败: " + str(e)) # # sleep(6) continue elapsed_time = current_time - start_time if elapsed_time >= 150: # 5分钟是300秒 break else: printn(f"{phone} 获取token {login['message']}") def first_request(res=''): global js, fw url = 'https://wapact.189.cn:9001/gateway/standExchange/detailNew/exchange' if res == '': response = ss.get(url) res = response.text soup = BeautifulSoup(res, 'html.parser') scripts = soup.find_all('script') for script in scripts: if 'src' in str(script): rsurl = re.findall('src="([^"]+)"', str(script))[0] if '$_ts=window' in script.get_text(): ts_code = script.get_text() urls = url.split('/') rsurl = urls[0] + '//' + urls[2] + rsurl # print(rsurl) ts_code += ss.get(rsurl).text content_code = soup.find_all('meta')[1].get('content') with open("瑞数通杀.js", encoding='utf-8') as f: js_code_ym = f.read() js_code = js_code_ym.replace('content_code', content_code).replace("'ts_code'", ts_code) js = execjs.compile(js_code) for cookie in ss.cookies: ck[cookie.name] = cookie.value return content_code, ts_code, ck def main(): global wt, rs r = ss.get('https://wapact.189.cn:9001/gateway/standExchange/detailNew/exchange') if '$_ts=window' in r.text: rs = 1 print("瑞数加密已开启") first_request() else: print("瑞数加密已关闭") rs = 0 # if os.environ.get('chinaTelecomAccount') != None: # chinaTelecomAccount = os.environ.get('chinaTelecomAccount') # else: # print('添加chinaTelecomAccount环境变量啊') chinaTelecomAccount = '19952447525@398104@6' for i in chinaTelecomAccount.split('&'): i = i.split('@') phone = i[0] password = i[1] level = i[2] uid = i[1] ticket = False # ticket = get_userTicket(phone) if phone in load_token: printn(f'{phone} 使用缓存登录') ticket = get_ticket(phone, load_token[phone]['userId'], load_token[phone]['token']) if ticket == False: printn(f'{phone} 使用密码登录') ticket = userLoginNormal(phone, password) if ticket: threading.Thread(target=ks, args=(phone, ticket, level, uid)).start() time.sleep(1) else: printn(f'{phone} 登录失败') jdhf = "" cfcs = 20 jdaid = '60dd79533dc03d3c76bdde30' ck = {} load_token_file = 'chinaTelecom_cache.json' try: with open(load_token_file, 'r') as f: load_token = json.load(f) except: load_token = {} main()