当前位置:网站首页>Analysis of protobuf format of real-time barrage and historical barrage at station B
Analysis of protobuf format of real-time barrage and historical barrage at station B
2022-07-06 15:59:00 【Catch the king before the thief】
Reference resources :
- https://zhuanlan.zhihu.com/p/392931611
- https://gitee.com/nbody1996/bilibili-API-collect/blob/master/danmaku/danmaku_proto.md
- Bilibili Historical barrage :https://www.cnblogs.com/mollnn/p/14964905.html
b The format of station barrage transmission is changed from the original xml Change it to protobuf, This format is binary coded transmission , Its transmission sales are much higher than the original xml, Therefore, it has certain advantages to reduce the pressure of the network at the mobile end . But one problem is , The bullet screen in this format becomes very difficult to parse , Usually from api The data obtained is a mess directly , You need a specific way to see the real content , It's a headache .
B Station not used protobuf The barrage interface before the Protocol
1、 What is? Protobuf
Protocol buffers are Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data – think XML, but smaller, faster, and simpler. You define how you want your data to be structured once, then you can use special generated source code to easily write and read your structured data to and from a variety of data streams and using a variety of languages.
The above passage comes from Google Protobuf Introduction to the official website , In short, it is a transmission protocol , Than xml smaller 、 faster 、 It's simpler , More information can be found in :https://developers.google.com/protocol-buffers/
2、 How to parse Protobuf Bullet curtain of
2.1 download Protoc compiler
Protoc It's used to put .proto Files are compiled into various programming languages ( Such as Python、Golang etc. ) The compiler , Carry out Protobuf Necessary conditions for analysis , It can be downloaded from the link below :https://github.com/protocolbuffers/protobuf
After downloading, unzip it to exe file , No installation required , But it needs to be added manually to Path in .
Determine whether the installation is successful by running the following code in the terminal :protoc --version
2.2 download Protobuf-Python In order to be in Python Chinese analysis Protobuf
Download address :https://github.com/protocolbuffers/protobuf
Unzip after download , Then enter python Entry directory ,
Execute the following command line code :
python setup.py clean
python setup.py build
python setup.py install
python setup.py test
2.3 Bullet screen proto Define and compile
Barrage format ,protobuf Structure :
dm.proto
syntax = "proto3";
package dm;
message DmSegMobileReply{
repeated DanmakuElem elems = 1;
}
message DanmakuElem{
int64 id = 1;
int32 progress = 2;
int32 mode = 3;
int32 fontsize = 4;
uint32 color = 5;
string midHash = 6;
string content = 7;
int64 ctime = 8;
int32 weight = 9;
string action = 10;
int32 pool = 11;
string idStr = 12;
}
name | meaning | type | remarks |
---|---|---|---|
id | bullet chat dmID | int64 | only Can be used for operating parameters |
progress | The time when the bullet screen appears in the video | int32 | millisecond |
mode | Barrage type | int32 | 1 2 3: Ordinary barrage 4: Bottom barrage 5: Top barrage 6: Reverse barrage 7: Advanced barrage 8: Code barrage 9:BAS bullet chat |
fontsize | Bullet screen font size | int32 | 18: Small 25: standard 36: Big |
color | Barrage color | uint32 | Decimal system RGB888 value |
midHash | sender UID Of HASH | string | Used to shield users and view all barrages sent by users You can also reverse check the user ID |
content | The contents of the barrage | string | utf-8 code |
ctime | Barrage sending time | int64 | Time stamp |
weight | The weight | int32 | Used for intelligent shielding level |
action | action | string | Unknown |
pool | Barrage pool | int32 | 0: Ordinary pool 1: Caption pool 2: Special pool ( Code /BAS bullet chat ) |
idStr | bullet chat dmID String type of | string | only Can be used for operating parameters |
2.4 analysis seg.so Bullet screen data in format
Sample video :https://www.bilibili.com/video/av98919207
Before parsing, you need to install python Of probuf package : pip install protobuf
compile proto Structure file ,
protoc --python_out=. dm.proto
After execution, it will generate dm_pb2.py, Introduce this into the code python file ,
dm_pj.py The code is as follows :
Be careful :
- Real time barrage Unwanted cookie, Ask directly to get seg.so
- Historical barrage need cookie To get it seg.so
# -*- coding: utf-8 -*-
# @Author :
# @Date :
# @File : dm_pj.py
# @description : XXX
import json
import requests
from dm_pb2 import DmSegMobileReply
from google.protobuf.json_format import MessageToJson, Parse
b_web_cookie = 'SESSDATA=fd25e2e6%2C1660373048%2C287c9%2A21;'
def get_date_list():
url = "https://api.bilibili.com/x/v2/dm/history/index?type=1&oid=168855206&month=2022-02"
headers = {
'cookie': b_web_cookie
}
response = requests.get(url, headers=headers)
print(json.dumps(response.json(), ensure_ascii=False, indent=4))
def dm_real_time():
url_real_time = 'https://api.bilibili.com/x/v2/dm/web/seg.so?type=1&oid=168855206&pid=98919207&segment_index=1'
resp = requests.get(url_real_time)
DM = DmSegMobileReply()
DM.ParseFromString(resp.content)
data_dict = json.loads(MessageToJson(DM))
# print(data_dict)
list(map(lambda x=None: print(x['content']), data_dict.get('elems', [])))
def dm_history():
url_history = 'https://api.bilibili.com/x/v2/dm/web/history/seg.so?type=1&oid=168855206&date=2022-02-23'
headers = {
'cookie': b_web_cookie
}
resp = requests.get(url_history, headers=headers)
DM = DmSegMobileReply()
DM.ParseFromString(resp.content)
data_dict = json.loads(MessageToJson(DM))
# print(data_dict)
list(map(lambda x=None: print(x['content']), data_dict.get('elems', [])))
if __name__ == '__main__':
# dm_real_time()
get_date_list()
# dm_history()
pass
Screenshot of execution result :
Barrage contrast :
边栏推荐
- JS调用摄像头
- 渗透测试 ( 4 ) --- Meterpreter 命令详解
- Information security - security professional name | CVE | rce | POC | Vul | 0day
- Cost accounting [13]
- Record of force deduction and question brushing
- [exercise-6] (UVA 725) division = = violence
- 【练习-10】 Unread Messages(未读消息)
- 对iptables进行常规操作
- D - Function(HDU - 6546)女生赛
- 渗透测试 ( 7 ) --- 漏洞扫描工具 Nessus
猜你喜欢
【高老师软件需求分析】20级云班课习题答案合集
[analysis of teacher Gao's software needs] collection of exercises and answers for level 20 cloud class
Information security - Analysis of security orchestration automation and response (soar) technology
Nodejs+vue网上鲜花店销售信息系统express+mysql
PySide6 信号、槽
1010 things that college students majoring in it must do before graduation
渗透测试 ( 8 ) --- Burp Suite Pro 官方文档
Penetration test (7) -- vulnerability scanning tool Nessus
渗透测试 ( 1 ) --- 必备 工具、导航
信息安全-威胁检测-flink广播流BroadcastState双流合并应用在过滤安全日志
随机推荐
【练习4-1】Cake Distribution(分配蛋糕)
F - Birthday Cake(山东省赛)
Penetration testing (5) -- a collection of practical skills of scanning King nmap and penetration testing tools
Optimization method of path problem before dynamic planning
[exercise-7] crossover answers
Determine the Photo Position
【练习-6】(Uva 725)Division(除法)== 暴力
渗透测试 ( 5 ) --- 扫描之王 nmap、渗透测试工具实战技巧合集
Accounting regulations and professional ethics [4]
E. Breaking the Wall
动态规划前路径问题优化方式
Gartner: five suggestions on best practices for zero trust network access
Information security - threat detection - Flink broadcast stream broadcaststate dual stream merging application in filtering security logs
[exercise -11] 4 values why sum is 0 (and 4 values of 0)
Opencv learning log 12 binarization of Otsu method
Research Report on market supply and demand and strategy of China's land incineration plant industry
【练习-9】Zombie’s Treasure Chest
Cost accounting [14]
Information security - threat detection engine - common rule engine base performance comparison
信息安全-安全编排自动化与响应 (SOAR) 技术解析