olegk wrote:
Yahoo as well as other high profile sites intentionally make it very
difficult to script their login process.
Yeah, no kidding! Here's my code...I basically combed there form and create
new NameValuePairs for them. They also have hash function onSubmit to MD5
the password
On 05/05/2010, lsacco occ...@gmail.com wrote:
olegk wrote:
Yahoo as well as other high profile sites intentionally make it very
difficult to script their login process.
Yeah, no kidding! Here's my code...I basically combed there form and create
new NameValuePairs for them.
sebb wrote:
On 05/05/2010, lsacco occ...@gmail.com wrote:
olegk wrote:
Yahoo as well as other high profile sites intentionally make it very
difficult to script their login process.
Yeah, no kidding! Here's my code...I basically combed there form and create
new NameValuePairs for
On Thu, May 6, 2010 at 1:26 AM, Jeff Davis j...@flyingdiamond.com wrote:
sebb wrote:
Perfect advice, the only thing I have to add is that Wireshark isn't much
help for https - if you can also log in on http then that will work great.
In Wireshark : Show the capture options - Capture filter
John Smith-151 wrote:
In Wireshark : Show the capture options - Capture filter - tcp port http
or host target_ip
I think it'll help
But how can you use Wireshark when the login site is HTTPS. Wireshark can
only sniff traffic in the clear unless you have the private key for the Web