Advertisement
Guest User

penetrate-cf

a guest
Sep 15th, 2014
282
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 0.94 KB | None | 0 0
  1. % cat petenrate-cf
  2. #!/usr/bin/env zsh
  3. while ! [[ -z $1 ]]
  4. do
  5.     url="$1"
  6.     curlopts=(
  7.         --user-agent "Mozilla/5.0 (X11; Linux i686 on x86_64; rv:30.0) Gecko/20100101 Firefox/30.0 Iceweasel/30.0"
  8.         --cookie-jar "/tmp/hk.cookies"
  9.         --cookie "/tmp/hk.cookies"
  10.     )
  11.     [ $DEBUG ] && curlopts+=( -v )
  12.     curl $curlopts $url > /tmp/cloudflare
  13.     if grep -q '<div class="cf-browser-verification cf-im-under-attack">' /tmp/cloudflare
  14.     then
  15.         domain="${${url#*//}%%/*}"
  16.         authurl="https://$domain/cdn-cgi/l/chk_jschl?jschl_vc=$(
  17.            awk -F\" '$4=="jschl_vc"{print $6}' /tmp/cloudflare
  18.            )&jschl_answer=$(
  19.            nodejs -p "t=\"$domain\"; a={}; $(grep '\[\]' /tmp/cloudflare); a.value")"
  20.         echo $authurl >&2
  21.         sleep 5.850
  22.         curl $curlopts --referer $url $authurl | grep -q 302 && curl --referer $authurl $url
  23.     else
  24.         cat /tmp/cloudflare
  25.     fi
  26.     shift
  27. done
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement