linux篡改url命令,linux 使用curl命令访问url并模拟cookie
1.目錄
linux下通過命令訪問url的方式有多種,主要如下
2.1.elinks
elinks – lynx-like替代角色模式WWW的瀏覽器
2.1.2.wget
這個會將訪問的首頁下載到本地
[root@el5-mq2 ~]# wget?http://www.baidu.com
3.3.curl
curl會顯示出源碼
4.4.lynx
5.5.curl使用實踐
現在有個需求,因為服務器在收集訪問數據,抓取cookie中的value,模擬url訪問時需要帶上cookie參數,curl命令剛好能完成這個功能。
首先查看幫助:
curl -h
-b/–cookie Cookie string or file to read cookies from (H)
-c/–cookie-jar Write cookies to this file after operation (H)
–create-dirs ? Create necessary local directory hierarchy
–crlf ? ? ? ? ?Convert LF to CRLF in upload
–crlfile Get a CRL list in PEM format from the given file
可以使用-b參數來完成,具體使用如下:
curl?–b?“key1=val1;key2=val2;”
或直接使用文件
curl -b ./cookie.txt
編寫測試實例:
curl?-b?“user_trace_token=20150518150621-02994ed9a0fb42d1906a56258e072fc4;LGUID=20150515135257-a33a769c-fac6-11e4-91ce-5254005c3644”?http://10.10.26.164:1235/click?v=1&logtype=deliver&position=home_hot-0&orderid=10197777&userid=1942556&positionid=148&url=http%3a%2f%2fwww.lagou.com%2fjobs%2f317000.html%3fsource%3dhome_hot%26i%3dhome_hot-5&fromsite=http%3a%2f%2fwww.lagou.com%2fzhaopin%2fAndroid%3flabelWords%3dlabel%26utm_source%3dAD__baidu_pinzhuan%26utm_medium%3dsem%26utm_campaign%3dSEM&optime=2015-06-15_20:00:00
發現這樣還是不可以,url附帶的參數取不到。使用-d 參數傳遞url參數,使用-G 把請求方式配置為GET就OK了,如下:
curl?-b?“user_trace_token=20150518150621-02994ed9a0fb42d1906a56258e072fc4;LGUID=20150515135257-a33a769c-fac6-11e4-91ce-5254005c3644;LGSID=20150518150621-02994ed9a0fb42d1906a56258e072fc4;LGRID=20150617230732-4ea87972-1580-11e5-9a88-000c29653e90;”?-d?“v=1&logtype=deliver&position=i_home-1&orderid=10197777&userid=1942556&positionid=148&url=http%3a%2f%2fwww.lagou.com%2fjobs%2f317000.html%3fsource%3dhome_hot%26i%3dhome_hot-5&fromsite=http%3a%2f%2fwww.lagou.com%2fzhaopin%2fAndroid%3flabelWords%3dlabel%26utm_source%3dAD__baidu_pinzhuan%26utm_medium%3dsem%26utm_campaign%3dSEM&optime=2015-06-15_20:00:00”????-G??http://10.10.26.164:1235/click
想要獲得response返回的cookie怎么辦,使用’-c’參數,同時可以使用-b filename用文件方式表示cookie,配合-c使用更方便
可以先用-c 命令生成一個cookie文件作為模板,再修改這個文件作為-b 參數的文件名。
使用如下:
curl -b c1.txt -c c2.txt -d “v=1&_v=j31&a=406405635&t=pageview&_s=1&dr=http%3a%2f%2fwww.sogou.com%2ftuguang&dl=http%3A%2F%2Fwww.lagou.com%2F%3futm_source%3dad_sougou_pingzhuan&ul=zh-cn&de=UTF-8&dt=%E6%8B%89%E5%8B%BE%E7%BD%91-%E6%9C%80%E4%B8%93%E4%B8%9A%E7%9A%84%E4%BA%92%E8%81%94%E7%BD%91%E6%8B%9B%E8%81%98%E5%B9%B3%E5%8F%B0&sd=24-bit&sr=1600×900&vp=1583×291&je=1&fl=18.0%20r0&_u=MACAAAQBK~&jid=&cid=1312768212.1431333683&tid=UA-41268416-1&z=1204746223” ? ?-G ?http://192.168.52.130:1234/collect
生成的c2.txt內容如下:
# Netscape HTTP Cookie File
# http://curl.haxx.se/docs/http-cookies.html
# This file was generated by libcurl! Edit at your own risk.192.168.52.130 FALSE / FALSE 1757574737 user_trace_token 20150914151217-eedd019e-5aaf-11e5-8a69-000c29653e90
192.168.52.130 FALSE / FALSE 1442217595 LGSID 20150914152955-652a13c5-5ab2-11e5-846d-000c29653e90
192.168.52.130 FALSE / FALSE 1442217595 PRE_UTM
192.168.52.130 FALSE / FALSE 1442217595 PRE_HOST www.huxiu.com
192.168.52.130 FALSE / FALSE 1442217595 PRE_SITE http%3A%2F%2Fwww.huxiu.com%2Ftuguang
192.168.52.130 FALSE / FALSE 1442217595 PRE_LAND http%3A%2F%2Fwww.lagou.com%2F%3F
192.168.52.130 FALSE / FALSE 0 LGRID 20150914152955-652a1630-5ab2-11e5-846d-000c29653e90
192.168.52.130 FALSE / FALSE 1757574737 LGUID 20150914151217-eedd0624-5aaf-11e5-8a69-000c29653e90
總結
以上是生活随笔為你收集整理的linux篡改url命令,linux 使用curl命令访问url并模拟cookie的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 如何恢复u盘文件--U盘文件被吃掉怎么恢
- 下一篇: RTL8811AU无线网卡linux驱动