PTC软件工具的制作流程

2011年2月13日 发表评论 阅读评论

今天举例说明一个PTC工具的制作流程,以buxwiz为例,为什么是buxwiz?因为这个网站已经关闭了。至于本篇文章的实际意义,不用闪电博客多说了吧?其他类的PTC网站,审核机制会更严格,但突破后,流程都是一样的!

首先我们需要清楚我们手动操作的过程,这个流程包括,打开登陆页面—->登陆—->打开浏览广告的页面—–>获得广告链接—–>打开广告链接——>等待读秒—–>加点。PTC工具的目地是一样的,就是模拟这个过程。

现在,使用截包工具,将以上的流程操作一遍,得到期间过程的数据收发,这里的数据内容如下:
==============================这个是打开登陆页
GET /l HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-silverlight, application/msword, application/vnd.ms-excel, */*
Referer: http://www.buxwiz.com/i
Accept-Language: zh-cn
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
Host: www.buxwiz.com
Connection: Keep-Alive
Cookie: PHPSESSID=c862caf76da923621ff74b50b691ff4d

==============================这个是载入验证码的图片,载入完成图片后要识别
GET /themes/buxwiz/bwcap?PHPSESSID=c862caf76da923621ff74b50b691ff4d HTTP/1.1
Accept: */*
Referer: http://www.buxwiz.com/l
Accept-Language: zh-cn
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
Host: www.buxwiz.com
Connection: Keep-Alive
Cookie: PHPSESSID=c862caf76da923621ff74b50b691ff4d

==============================这个将数据提交到服务器,提交完成后,你就登陆了
POST /l HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-silverlight, application/msword, application/vnd.ms-excel, */*
Referer: http://www.buxwiz.com/l
Accept-Language: zh-cn
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
Host: www.buxwiz.com
Content-Length: 123
Connection: Keep-Alive
Cache-Control: no-cache
Cookie: PHPSESSID=c862caf76da923621ff74b50b691ff4d

token=ce04a7e9a050b988d5119b1c4edd660732e095a4&login_username=用户名& amp;login_password=密码&login_spassword=&keystring=验证码

==============================这个是打开浏览页面
GET /v HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-silverlight, application/msword, application/vnd.ms-excel, */*
Referer: http://www.buxwiz.com/a
Accept-Language: zh-cn
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
Host: www.buxwiz.com
Connection: Keep-Alive
Cookie: PHPSESSID=c862caf76da923621ff74b50b691ff4d; chhrz=555183669058fb273008595a9393d628

到这里,打开了页面以后,从返回的数据里找到要点击的链接,并用变量将它们保存起来

==============================这个是打开其中一条广告链接
GET /mdl?k=6B097E496EA54D4087DAA0C9BDD3BAC8&cdk=flase HTTP/1.1
Accept: */*
Referer: http://www.buxwiz.com/v
Accept-Language: zh-cn
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
Host: www.buxwiz.com
Connection: Keep-Alive
Cookie: PHPSESSID=c862caf76da923621ff74b50b691ff4d; chhrz=555183669058fb273008595a9393d628

链接打开了以后,就进入了读秒阶段,这里要自定义一个时间段

==============================这个是读秒完成以后,发送回服务器的数据,意思是告诉服务器:我看完这个广告了,加钱吧
GET /nkbb_dT565.php?complete& HTTP/1.1
Accept: */*
Referer: http://www.buxwiz.com/mdl?k=6B09 … 0C9BDD3BAC8&cdk=flase
Accept-Language: zh-cn
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
Host: www.buxwiz.com
Connection: Keep-Alive
Cookie: PHPSESSID=c862caf76da923621ff74b50b691ff4d; chhrz=555183669058fb273008595a9393d628; 6B097E496EA54D4087DAA0C9BDD3BAC8=1246356617
==============================================================
这样,一个点击一条广告的流程就完成了,然后,就可以再次进入读取下一条广告,直到读完为止
程序要做的,就是将以上的流程控制好,将以上数据生成好,然后依次发送回服务器,再依据服务器返回的信息,判断是否读点成功等等

其中,登陆的操作只需要一次,界时,再将登陆后的cookie以变量保存,每次发送数据时,将cookie发送回服务器,你就可以保持登陆状态。


转载请注明来自:[闪电博客]http://shandian.biz/286.html

分类: 电脑知识 标签: ,
  1. 本文目前尚无任何评论.