【极验测试站】
https://www.geetest.com/demo/slide-popup.html
滑动验证码如下图
破解滑动验证码一般都是得到验证码的原图和有滑块的图,这里我们抓包发现极验的原图和滑块图经过了一定的处理,比较难操作,所以我们可以通过截图的方式来处理。
-
原图
-
滑块图
结果展示
操作见代码,注释写的比较详细
#!/usr/bin/env python
# encoding: utf-8
# -*- coding: utf-8 -*-
# @software: PyCharm
# @time: 2019/5/6 10:31
# @author: Paulson●Wier
# @file: geetest_demo.py
# @desc:
from selenium.webdriver.support import expected_conditions as EC
from selenium import webdriver
from selenium.webdriver.support.wait import WebDriverWait
from selenium.webdriver.common.by import By
from selenium.webdriver import ActionChains
from PIL import Image
from io import BytesIO
import time
BORDER = 6
class CrackGeetest(object):
def __init__(self):
self.url = 'https://www.geetest.com/demo/slide-popup.html'
options = webdriver.ChromeOptions()
options.add_argument("--start-maximized")
self.browser = webdriver.Chrome(options=options)
self.wait = WebDriverWait(self.browser, 10)
def open(self):
"""
打开网页
:return None
"""
self.browser.get(self.url)
def close(self):
"""
关闭网页
:return None
"""
self.browser.close()
self.browser.quit()
def change_to_slide(self):
"""
切换为滑动认证
:return 滑动选项对象
"""
huadong = self.wait.until(
EC.element_to_be_clickable((By.CSS_SELECTOR, '.products-content > ul > li:nth-child(2)'))
)
return huadong
def get_geetest_button(self):
"""
获取初始认证按钮
:return 按钮对象
"""
button = self.wait.until(
EC.element_to_be_clickable((By.CSS_SELECTOR, '.geetest_radar_tip_content'))
)
return button
def wait_pic(self):
"""
等待验证图片加载完成
:return None
"""
self.wait.until(
EC.presence_of_element_located((By.CSS_SELECTOR, '.geetest_popup_wrap'))
)
def get_screenshot(self):
"""
获取网页截图
:return: 截图对象
"""
screenshot = self.browser.get_screenshot_as_png()
self.browser.save_screenshot("yanzhengma1.png")
screenshot = Image.open(BytesIO(screenshot))
return screenshot
def get_position(self):
"""
获取验证码位置
:return: 位置元组
"""
img = self.wait.until(EC.presence_of_element_located((By.CSS_SELECTOR, '.geetest_canvas_img.geetest_absolute')))
time.sleep(2)
location = img.location
size = img.size
# top, bottom = location['y'] - size['height'], location['y']
# print("top")
# left, right = location['x'], location['x'] + size['width']
left = location['x']
top = location['y']
right = left + size['width']
bottom = top + size['height']
return top, bottom, left, right
def get_slider(self):
"""
获取滑块
:return: 滑块对象
"""
slider = self.wait.until(EC.element_to_be_clickable((By.CLASS_NAME, 'geetest_slider_button')))
return slider
def get_geetest_image(self, name='captcha.png'):
"""
获取验证码图片
:return: 图片对象
"""
top, bottom, left, right = self.get_position()
print('验证码位置', top, bottom, left, right)
screenshot = self.get_screenshot()
captcha = screenshot.crop((left, top, right, bottom))
captcha.save(name)
return captcha
def delete_style(self):
"""
执行js脚本,获取无滑块图
:return None
"""
js = 'document.querySelectorAll("canvas")[2].style=""'
self.browser.execute_script(js)
def is_pixel_equal(self, img1, img2, x, y):
"""
判断两个像素是否相同
:param img1: 不带缺口图片
:param img2: 带缺口图
:param x: 位置x
:param y: 位置y
:return: 像素是否相同
"""
# 取两个图片的像素点
pix1 = img1.load()[x, y]
pix2 = img2.load()[x, y]
# print(pix1+" "+pix2)
threshold = 60
if abs(pix1[0] - pix2[0]) < threshold and abs(pix1[1] - pix2[1]) < threshold and abs(pix1[2] - pix2[2]) < threshold:
return True
else:
return False
def get_gap(self, img1, img2):
"""
获取缺口偏移量
:param img1: 不带缺口图片
:param img2: 带缺口图
:return 缺口位置
"""
left = 70
for i in range(left, img1.size[0]):
for j in range(img1.size[1]):
if not self.is_pixel_equal(img1, img2, i, j):
left = i
return left
return left
def get_track(self, distance):
"""
根据偏移量获取移动轨迹
:param distance: 偏移量
:return: 移动轨迹
"""
# 移动轨迹
track = []
# 当前位移
current = 0
# 减速阈值
mid = distance * 3 / 5
# 计算间隔
t = 0.2
# 初速度
v = 0
# 滑超过过一段距离
distance += 15
while current < distance:
if current < mid:
# 加速度为正
a = 1
else:
# 加速度为负
a = -0.5
# 初速度 v0
v0 = v
# 当前速度 v
v = v0 + a * t
# 移动距离 move-->x
move = v0 * t + 1 / 2 * a * t * t
# 当前位移
current += move
# 加入轨迹
track.append(round(move))
return track
def shake_mouse(self):
"""
模拟人手释放鼠标时的抖动
:return: None
"""
ActionChains(self.browser).move_by_offset(xoffset=-2, yoffset=0).perform()
ActionChains(self.browser).move_by_offset(xoffset=2, yoffset=0).perform()
def move_to_gap(self, slider, tracks):
"""
拖动滑块到缺口处
:param slider: 滑块
:param tracks: 轨迹
:return
"""
back_tracks = [-1, -1, -2, -2, -3, -2, -2, -1, -1]
ActionChains(self.browser).click_and_hold(slider).perform()
# 正向
for x in tracks:
ActionChains(self.browser).move_by_offset(xoffset=x, yoffset=0).perform()
time.sleep(0.5)
# 逆向
for x in back_tracks:
ActionChains(self.browser).move_by_offset(xoffset=x, yoffset=0).perform()
# 模拟抖动
self.shake_mouse()
time.sleep(0.5)
ActionChains(self.browser).release().perform()
def crack(self):
try:
# 打开网页
self.open()
# # 转换验证方式,点击认证按钮
# s_button = self.change_to_slide()
# time.sleep(1)
# s_button.click()
g_button = self.get_geetest_button()
g_button.click()
# 确认图片加载完成
self.wait_pic()
# 获取滑块
slider = self.get_slider()
# 获取带缺口的验证码图片
image1 = self.get_geetest_image('captcha1.png')
self.delete_style()
image2 = self.get_geetest_image('captcha2.png')
gap = self.get_gap(image1, image2)
print('缺口位置', gap)
gap -= BORDER
track = self.get_track(gap)
self.move_to_gap(slider, track)
success = self.wait.until(
EC.text_to_be_present_in_element((By.CLASS_NAME, 'geetest_success_radar_tip_content'), '验证成功')
)
print(success)
time.sleep(5)
self.close()
except:
print('Failed-Retry')
self.crack()
if __name__ == '__main__':
crack = CrackGeetest()
crack.crack()
可以的话点个赞
点击前往GitHub项目地址
版权声明:本文为qq_38534107原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。