谁有空 写个脚本 塞爆他的数据库
Request URL: http://www.p11437.cn//1/q1q.php
Request Method: POST
Status Code: 200 OK
Remote Address: 43.224.153.142:80
Referrer Policy: no-referrer-when-downgrade
Connection: keep-alive
Content-Length: 6
Content-Type: text/html; charset=utf-8
Date: Tue, 07 Jul 2020 02:42:15 GMT
Refresh: 0;url=https://mail.qq.com/cgi-bin/loginpage
Server: wts/1.6.3
X-Powered-By: PHP/5.3.29
X-Powered-By: ASP.NET
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cache-Control: max-age=0
Connection: keep-alive
Content-Length: 122
Content-Type: application/x-www-form-urlencoded
Cookie: UM_distinctid=1732724271f924-045449e264c548-376b4502-1fa400-173272427208b3; CNZZDATA1256793290=972621531-1594085795-%7C1594085795
DNT: 1
Host: www.p11437.cn
Origin: http://www.p11437.cn
Referer: http://www.p11437.cn//1/iframe.html?p=yu
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36
p: yu
s6dd1e4c402b7872f:
scfbad2e80f58d206:
sa7929578b408c909:
s7ff2b2e95569f56d: 341231231 |