Open TomGoBravo opened 4 years ago
I've made very little progress on extracting the POST values for X-zuY25QsG-f
and ...-b/c/d/z/a
. ...-f
is in local storage verbatim with key f
, I can't find where in the js these get added to the POST request. A Google search for zuY25QsG
pulls up Broadcom Configure HTML Forms Authentication but I don't see that string on the page.
Perhaps running a real browser as done by https://github.com/liamCorbett/adp-webscrape is the way to go. :-/
I appreciate you looking into this, but I agree it's likely Selenium style is the only way to go at this point. "Back in the day" this was sufficient, but to be honest I'm a little glad something this simple doesn't work any longer 😅
Hey David, thank you for checking back on this. I'm not sure I agree that there is any more security when scrapers need to upgrade to Selenium but oh well. I also bumped into some javascript one can run in the chrome console to download after logging in manually: https://gist.github.com/azagniotov/210c31540712c10206484d5297616842
any update that works for 2024? need full code, please.
I tried using this handy looking tool recently but got the following crash:
I ran it in a debugger and the
requests
response looks different from when I try an incorrect password.Using Chrome's
Copy as cURL
it looks like there is a bunch of data (a few kB that look almost like base64url encoded binary except for some single%3D
in the middle of the values) included with the POST data beyond basics currently sent byadp.py
. With curl when the extra data is included I get a good login response and with only user, password, target, redirectUrl I get an error. I don't see these values in the HTML form hidden inputs so I'm guessing they are added by javascript. I haven't found them in the javascript yet.