ªð¦^¦Cªí ¤W¤@¥DÃD µo©«

[µo°Ý] ¹Ï§ÎÅçÃÒ(Captcha) ¯}¸Ñ?

¦^´_ 7# GBKEE


    Ãö©ó¹Ï§ÎÅçÃÒCaptchaªº¤è¦¡,³o¬Ojoey0415´£¨Ñ±o[°Ñ¦Ò]¨Ó·½
¬Ý¤£À´^_^!!          ¦ý¶]ÅçÃÒ½X¬O¥¿½Tªº
  1. Public Declare Function GetClipboardData Lib "user32" (ByVal wFormat As Long) As Long
  2. Public Declare Function CloseClipboard Lib "user32" () As Long
  3. Public Declare Function OpenClipboard Lib "user32" (ByVal hwnd As Long) As Long
  4. Private Declare Function GlobalLock Lib "kernel32" (ByVal hMem As Long) As Long
  5. Private Declare Function GlobalSize Lib "kernel32" (ByVal hMem As Long) As Long
  6. Private Declare Function GlobalUnlock Lib "kernel32" (ByVal hMem As Long) As Long
  7. Private Declare Sub CopyMemory Lib "kernel32" Alias "RtlMoveMemory" (Destination As Any, Source As Any, ByVal Length As Long)
  8. '°Å¶Kª©¸ê®Æ®æ¦¡©w¸q
  9. Private Const CF_DIB = 8

  10. Sub ÅçÃÒ½XÃѧO()
  11.     Dim a(1 To 4)
  12.     Dim img       '¡]ÅçÃÒ½X¡^¹Ï¤ù
  13.     Dim CtrlRange '«D¤å¥»ª«¥ó¶°¦X
  14.     Dim bytClipData()  As Byte '©w¸q¦ì¤¸²Õ°}¦C
  15.     Dim arr(0 To 1260)
  16.     Dim ts As Integer
  17.     On Error Resume Next
  18.     Set Regedit_XG = CreateObject("WScript.Shell")              '³Ð«Ø¤@­ÓªÅªºVBS"´ß"
  19.     Jz = Regedit_XG.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1407")                   'Ū¨úµù¥Uªí"¦w¥þ³]¸m-Internet°Ï°ì"¤¤ªº"¤¹³\¹ï°Å¶KªO¶i¦æ½sµ{³X°Ý"³]¸m(3¡×¸T¥Î¡B0¡×±Ò¥Î¡B1¡×´£¥Ü)­ì©l­È
  20.     Regedit_XG.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1407", "0", "REG_DWORD"      '­×§ïµù¥Uªí"¦w¥þ³]¸m-Internet°Ï°ì"¤¤ªº"¤¹³\¹ï°Å¶KªO¶i¦æ½sµ{³X°Ý"³]¸m(3¡×¸T¥Î¡B0¡×±Ò¥Î¡B1¡×´£¥Ü)¡A¨Ï¨t²ÎÀq»{¬°"¤¹³\³X°Ý°Å¶KªO"
  21.     With CreateObject("InternetExplorer.application")           '³Ð«Ø¤@­ÓªÅªºie
  22.         .Visible = True                                         'Åýie¥i¨£
  23.         .Navigate "http://119.145.135.38/fscx/web/loginForm.do" '¾É¯è¨ìhttp://119.145.135.38/fscx/web/loginForm.do
  24.         Do Until .ReadyState = 4               'µ¥«Ýie§¹²¦¸ü¤J
  25.             DoEvents
  26.         Loop
  27.         Set img = .Document.All.tags("img")(0) '«ü©w¡]ÅçÃÒ½X¡^¥Ø¼Ð¹Ï¤ù
  28.         Set CtrlRange = .Document.body.createControlRange()  '³Ð«Ø«D¤å¥»ª«¥ó ControlRange ¶°¦X
  29.         CtrlRange.Add img                      '¦V«D¤å¥»ª«¥ó ControlRange ¶°¦X¤¤²K¥[ img ª«¥ó
  30.         CtrlRange.execCommand "Copy", True     '±q ControlRange ¶°¦X¤¤copy img ª«¥ó¡]¹Ï¤ù¡^¨ì°Å¶KªO
  31.         Dim hMem As Long, lpData As Long
  32.         OpenClipboard 0&                       '¥´¶}Ö߶KªO
  33.         hMem = GetClipboardData(8)             'Àò±oÖ߶KªO¸ê®Æ¡A«ü©w®æ¦¡¬°¡GCF_DIB = 8
  34.         If CBool(hMem) Then
  35.             lpData = GlobalLock(hMem)          'Âê©w°O¾ÐÅ骫¥óhMen
  36.             lClipSize = GlobalSize(hMem)       'Àò±oÖ߶KªO¸ê®Æ¦ì¤¸²Õ¼Æ
  37.             If lpData <> 0 And lClipSize > 0 Then
  38.                 ReDim bytClipData(0 To lClipSize - 1) As Byte      '­«·s©w¸q¦ì¤¸²Õ°}¦C¤j¤p
  39.                 CopyMemory bytClipData(0), ByVal lpData, lClipSize 'Ö߶KªOÂà¤Æ¦¨¦ì¤¸²Õ°}¦C
  40.             End If
  41.             GlobalUnlock hMem                  '¸Ñ°£Âê©w°O¾ÐÅ骫¥óhMen
  42.         End If
  43.         CloseClipboard                         'Ãö³¬Ö߶KªO
  44.         For i = 1 To 1260                      'Âk¤@¤Æ³B²z
  45.             ts = (Val(bytClipData((i - 1) * 3 + 40)) + Val(bytClipData((i - 1) * 3 + 41)) + Val(bytClipData((i - 1) * 3 + 42))) / 3 '40¬O¹Ï¤ù¶}©l¦ì¤¸²Õ
  46.             If ts > 150 Then
  47.                 ts = 0
  48.             Else
  49.                 ts = 1
  50.             End If
  51.             arr(i) = ts
  52.         Next i
  53.         For i = 1 To 4
  54.             a(i) = 0                                                          '0
  55.             If arr(13 * 60 + 8 + (i - 1) * 14) = 1 And arr(14 * 60 + 8 + (i - 1) * 14) = 1 Then a(i) = 1: GoTo 1 '16¦ì¦â¡A©Ò¥H­¼¥H"3"RGB¦U¥e¤@¦ì¤¸²Õ¡A60¬O¼e¡A14¬O¦r¶¡¶Z¡A
  56.             If arr(4 * 60 + 6 + (i - 1) * 14) = 1 Then a(i) = 2: GoTo 1       '2
  57.             If arr(16 * 60 + 11 + (i - 1) * 14) = 0 Then a(i) = 3: GoTo 1     '3
  58.             If arr(7 * 60 + 5 + (i - 1) * 14) = 1 Then a(i) = 4: GoTo 1       '4
  59.             If arr(12 * 60 + 9 + (i - 1) * 14) = 1 Then a(i) = 5: GoTo 1      '5
  60.             If arr(9 * 60 + 8 + (i - 1) * 14) = 1 And arr(11 * 60 + 9 + (i - 1) * 14) = 1 Then a(i) = 6: GoTo 1  '6
  61.             If arr(16 * 60 + 13 + (i - 1) * 14) = 1 Then a(i) = 7: GoTo 1     '7
  62.             If arr(10 * 60 + 8 + (i - 1) * 14) = 1 And arr(11 * 60 + 8 + (i - 1) * 14) = 1 Then a(i) = 8: GoTo 1 '8
  63.             If arr(9 * 60 + 9 + (i - 1) * 14) = 1 Then a(i) = 9               '9
  64. 1:
  65.         Next i
  66.         Cells(1, 1) = a(1) & a(2) & a(3) & a(4)             'ÃѧO«áªºÅçÃÒ½X
  67.         .Document.All.tags("INPUT")(0).Value = "1234567890" '¶ñ¼gµn¿ý¦W
  68.         .Document.All.tags("INPUT")(1).Value = "0987654321" '¶ñ¼g±K  ½X
  69.         .Document.All.tags("INPUT")(2).Value = Cells(1, 1)  '¶ñ¼gÅçÃÒ½X
  70.         .Document.All.tags("img")(1).Click                  'ÂIÀ»"µn¿ý"«ö¶s
  71.         '.Quit                     'Ãö³¬ie
  72.         'MsgBox "OK"
  73.     End With
  74.     Regedit_XG.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1407", Jz, "REG_DWORD"      '«ì´_µù¥Uªí"¦w¥þ³]¸m-Internet°Ï°ì"¤¤ªº"¤¹³\¹ï°Å¶KªO¶i¦æ½sµ{³X°Ý"³]¸m(3¡×¸T¥Î¡B0¡×±Ò¥Î¡B1¡×´£¥Ü)­ì©l­È
  75.     Set Regedit_XG = Nothing      'ÄÀ©ñVBS"´ß"
  76. End Sub
½Æ»s¥N½X

TOP

¦^´_ 7# GBKEE


    ¹ï¤£°_!§Ñ¤Fªþ¤WURL
¤U¸üCSV¬ÛÃö¦ì§}:
(1)¤£ª¾¹D¥Îªº¤W?!
http://bsr.twse.com.tw/bshtm/bsMenu.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUKLTQzNzI3ODE3MQ9kFgICAQ9kFg4CBQ8WAh4JaW5uZXJodG1sBQoyMDEzLzA5LzI3ZAIGDxYCHwAFCDIwMTMwOTI3ZAIIDw8WBh4JRm9udF9Cb2xkZx4EXyFTQgKEEB4JRm9yZUNvbG9yCj1kZAIKD2QWAgIBDw9kFgIeB09uQ2xpY2sFHGphdmFzY3JpcHQ6YnV0Q2xlYXJfQ2xpY2soKTtkAgwPDxYGHwFoHwIChBAfAwpHZGQCDg8PFgIeB1Zpc2libGVoZGQCEA8PFgYfAWgfAgKEEB8DCkdkZGSiKU%2Fti2BvI3vsAvp%2BUySKAAAAAA%3D%3D&__EVENTVALIDATION=%2FwEWCQKGnJS3DwLjpuXcAwKN4Ij0CwLB5ZfoCQLjk6TKBwKY8en5CwLdkpmPAQL6n7vzCwLAhrvLBeRfGpOZWTxdVZsdlLXS6sgAAAAA&HiddenField_spDate=&HiddenField_page=PAGE_DownloadBS&txtTASKNO=%E8%AB%8B%E8%BC%B8%E5%85%A5%E8%82%A1%E7%A5%A8%E4%BB%A3%E7%A2%BC&hidTASKNO=&Button_DownloadBS=%3C%E4%B8%8B%E8%BC%89+CSV%3E

(2)Download
http://bsr.twse.com.tw/bshtm/bsDownload.aspx?__VIEWSTATE=%2FwEPDwUJNDA4NDA2OTYwZGSrd3Tlksjh9VIjA2KPwnxSAAAAAA%3D%3D&__EVENTVALIDATION=%2FwEWBgLgmuzfAwLPiaeCCQLNkNdZAs%2Bk8%2FwMAp%2BC7OYNAsyPx6EHbi4KW9bFIDAKFtSJoAwOXQAAAAA%3D&HiddenField_Download=&TextBox_Stkno=ªÑ²¼¥N¸¹&TextBox_VerifyCode=ÅçÃÒ½X&Button_Download=%E4%B8%8B%E8%BC%89

TOP

¦^´_ 10# joey0415


VBA§ÚÀ´«Ü¤Ö­C!!

´ú¸Õ¤ß±o   
(1)¥i¥H¥ý¾É¦Vhttp://bsr.twse.com.tw/bshtm/bsDownload.aspx?__VIEWSTATE=%2FwEPDwUJNDA4NDA2OTYwZGSrd3Tlksjh9VIjA2KPwnxSAAAAAA%3D%3D&__EVENTVALIDATION=%2FwEWBgLgmuzfAwLPiaeCCQLNkNdZAs%2Bk8%2FwMAp%2BC7OYNAsyPx6EHbi4KW9bFIDAKFtSJoAwOXQAAAAA%3D&HiddenField_Download=&TextBox_Stkno=ªÑ²¼¥N½X
(2)¦A¿é¤JÅçÃÒ½X (³o,§Ú¤]¤£·| ^_^ ,©êºp!)
(3)¨ä«á,ÅçÃÒ½X¥¿½T«á  if(document.getElementById('HiddenField_Download').value == 'OK')
¦n¹³ÁÙ±o¦^¨ì http://bsr.twse.com.tw/bshtm/ ¤~·|§¹¦¨ [¤U¸ü]

¦n¹³¬O³o¼Ë (·kÀY¶Ì¯º

TOP

¥»©«³Ì«á¥Ñ HSIEN6001 ©ó 2013-10-1 10:41 ½s¿è

¦^´_ 15# lalalada

¸Õ¸Õ³o­Ó!!ÂŤѤj¼gªº
ÅçÃÒÃѧO.rar (13.26 KB)
¦U¼Ë¦¡ÅçÃÒ½XÃѧO : http://club.excelhome.net/thread-896161-1-1.html
ÂŤѤjªºBlog http://blog.csdn.net/a814153a/article/details/9375971
liucqa : http://club.excelhome.net/thread-897117-1-1.html
°Ñ¦Ò : http://bbs.csdn.net/topics/390090057
½×¤å : http://www.digitaltrends.com/web/stanford-researchers-crack-captcha-codes/
-----------------------------------
©êºp!!¥H¤W§Ú¬O,¦³¬Ý¨S¦³À´  ^^

¶È¥H¤U´ú¸Õ,§¹¦¨¤U¸ü¨é°Ó¤é³øªí,¬yµ{:
(1)¾É¦V http://bsr.twse.com.tw/bshtm/bsDownload.aspx?__VIEWSTATE=%2FwEPDwUJNDA4NDA2OTYwZGSrd3Tlksjh9VIjA2KPwnxSAAAAAA%3D%3D&__EVENTVALIDATION=%2FwEWBgLgmuzfAwLPiaeCCQLNkNdZAs%2Bk8%2FwMAp%2BC7OYNAsyPx6EHbi4KW9bFIDAKFtSJoAwOXQAAAAA%3D&HiddenField_Download=&TextBox_Stkno=1101  '¥ý«ü©wªÑ²¼¥N¸¹
(2)¨é°Ó¤é³øªíªºÅçÃÒ½X,[«Ý°ª¤â¸Ñ¨MÅo!] http://bsr.twse.com.tw/bshtm/VerifyImage.aspx?tick=635162133074615000
(3)¦^¨ì http://bsr.twse.com.tw/bshtm/
(4).Document.getElementById("Button_DownloadBS").Click                    'ÂIÀ»,"¤U¸üCSV"

TOP

        ÀR«ä¦Û¦b : ¦Y­W¤F­W¡B­WºÉ¤Ü¨Ó¡A¨ÉºÖ¤FºÖ¡BºÖºÉ´d¨Ó¡C
ªð¦^¦Cªí ¤W¤@¥DÃD