asp.net 去除viewstate第1/2页
程序员文章站
2022-04-10 12:16:06
看下这段代码:生成了这么多的一段东西,这段东西对seo一点好处也没有。而我要做的就是去掉它,但有一点,去掉但不能让它原来的控件和内容都发生变化,比如说不能使用等等。所以我要...
看下这段代码:
生成了这么多的一段东西,这段东西对seo一点好处也没有。而我要做的就是去掉它,但有一点,去掉但不能让它原来的控件和内容都发生变化,比如说不能使用等等。所以我要做的仅仅是用另一种方式去保存这些数据。这是一段用base64编码的数据而并不是加密,我很好奇到底放了些什么东西在这里面。下面我开始破解这段代码。代码如下:
string str = "/wEPDwUKLTY4MTg1OTU4Nw9kFgJmD2QWAgIED2QWAgIDD2QWEGYPFgIeBFRleHQFDOeOqeWFt+WIhuexu2QCAQ8WAh4LXyFJdGVtQ291bnQCGBYwZg9kFgJmDxUCAzc4NQ7ovabns7vliJcgQ2Fyc2QCAQ9kFgJmDxUCAzgwMQ/oiLnns7vliJcgQm9hdHNkAgIPZBYCZg8VAgM4MDkT6aOe5py657O75YiXIFBsYW5lc2QCAw9kFgJmDxUCAzgxMRDpo57nop/ns7vliJcgVUZPZAIED2QWAmYPFQIDODEyGOebiuaZuuezu+WIlyBFZHVjYXRpb25hbGQCBQ9kFgJmDxUCAzgxMxXlqbTlhL/ns7vliJcgQmFieSBzZXRkAgYPZBYCZg8VAgM4MTQU5Yqo5ryr57O75YiXIENhcnRvb25kAgcPZBYCZg8VAgM4MTUU5rOh5rOh57O75YiXIEJ1YmJsZXNkAggPZBYCZg8VAgM4MTYa6K6+5pa957O75YiXIEVzdGFibGlzaG1lbnRkAgkPZBYCZg8VAgM4MTcT6L+Q5Yqo57O75YiXIFNwb3J0c2QCCg9kFgJmDxUCAzgxOBnmraboo4Xns7vliJcgTWlsaXRhcnkgc2V0ZAILD2QWAmYPFQIDODE5FuijhemlsOezu+WIlyBPcm5hbWVudHNkAgwPZBYCZg8VAgM4MjAa6YCa6K6v57O75YiXIENvbW11bmljYXRpb25kAg0PZBYCZg8VAgM4MjEU5LmQ5Zmo57O75YiXIE11c2ljYWxkAg4PZBYCZg8VAgM4MjIX5rC05py657O75YiXIFdhdGVyIGdhbWVkAg8PZBYCZg8VAgM4MjMQ6aOO5omH57O75YiXIEZhbmQCEA9kFgJmDxUCAzgyNBLlt6Xlhbfns7vliJcgVG9vbHNkAhEPZBYCZg8VAgM4MjUU5Yqo54mp57O75YiXIEFuaW1hbHNkAhIPZBYCZg8VAgM4MjYT55u45py657O75YiXIENhbWVyYWQCEw9kFgJmDxUCAzgyNxjmtojpmLLns7vliJcgRmlyZSBFbmdpbmVkAhQPZBYCZg8VAgM4MjgY5bel56iL57O75YiXIEVuZ2luZWVyaW5nZAIVD2QWAmYPFQIDODI5EOiHquijheeOqeWFtyBESVlkAhYPZBYCZg8VAgM4MzAX5paH5YW357O75YiXIFN0YXRpb25lcnlkAhcPZBYCZg8VAgM4MzEX5YW25LuW546p5YW3IE90aGVyIFRveXNkAgMPDxYCHgtOYXZpZ2F0ZVVybAU+bGlzdC5hc3B4P2lkPSZicmFuZD0mbnVtPSZvcmRlcj0wJmtleV9uPSZrZXlfcF9tYXg9JmtleV9wX21pbj1kZAIEDw8WAh8CBT5saXN0LmFzcHg/aWQ9JmJyYW5kPSZudW09NSZvcmRlcj0ma2V5X249JmtleV9wX21heD0ma2V5X3BfbWluPWRkAgUPDxYCHwIFP2xpc3QuYXNweD9pZD0mYnJhbmQ9Jm51bT0xMCZvcmRlcj0ma2V5X249JmtleV9wX21heD0ma2V5X3BfbWluPWRkAgYPDxYCHwIFP2xpc3QuYXNweD9pZD0mYnJhbmQ9Jm51bT0xNSZvcmRlcj0ma2V5X249JmtleV9wX21heD0ma2V5X3BfbWluPWRkAgkPFgIfAQIFFgpmD2QWCAICDxUCBjEzMTY4MC5odHRwOi8vaW1nLnRveXNnb2dvLmNvbS91cGxvYWQvc2ltZy9UNjUxNzAuanBnZAIEDxUCBjEzMTY4MBjnlLXliqjlhpvkuovoiYfliqDlhpvkurpkAgUPDxYCHgtDb21tYW5kTmFtZQUGMTMxNjgwZGQCBg8VAwYxMzE2ODACMjUENGRvemQCAQ9kFggCAg8VAgYxMzE2OTQuaHR0cDovL2ltZy50b3lzZ29nby5jb20vdXBsb2FkL3NpbWcvVDY1MTg0LmpwZ2QCBA8VAgYxMzE2OTQJ5ri45rOz6ZWcZAIFDw8WAh8DBQYxMzE2OTRkZAIGDxUDBjEzMTY5NAE1BTE4ZG96ZAICD2QWCAICDxUCBjEzMTY4Ni5odHRwOi8vaW1nLnRveXNnb2dvLmNvbS91cGxvYWQvc2ltZy9UNjUxNzMuanBnZAIEDxUCBjEzMTY4NgbppJDlhbdkAgUPDxYCHwMFBjEzMTY4NmRkAgYPFQMGMTMxNjg2AjE1BDNkb3pkAgMPZBYIAgIPFQIGMTMxNjk2Lmh0dHA6Ly9pbWcudG95c2dvZ28uY29tL3VwbG9hZC9zaW1nL1Q2NTE4Ny5qcGdkAgQPFQIGMTMxNjk2Cea4uOazs+mVnGQCBQ8PFgIfAwUGMTMxNjk2ZGQCBg8VAwYxMzE2OTYBNQUyNGRvemQCBA9kFggCAg8VAgYxMzE3MDAuaHR0cDovL2ltZy50b3lzZ29nby5jb20vdXBsb2FkL3NpbWcvVDY1MTg5LmpwZ2QCBA8VAgYxMzE3MDAJ5ri45rOz6ZWcZAIFDw8WAh8DBQYxMzE3MDBkZAIGDxUDBjEzMTcwMAE1BTE2ZG96ZAIMDw8WBh4QQ3VycmVudFBhZ2VJbmRleAIBHgtSZWNvcmRjb3VudALNKR4IUGFnZVNpemUCBWRkGAEFHl9fQ29udHJvbHNSZXF1aXJlUG9zdEJhY2tLZXlfXxYFBSdjdGwwMCRtaWRkbGVjb250ZW50JHJwdExpc3QkY3RsMDAkY2J4SWQFJ2N0bDAwJG1pZGRsZWNvbnRlbnQkcnB0TGlzdCRjdGwwMSRjYnhJZAUnY3RsMDAkbWlkZGxlY29udGVudCRycHRMaXN0JGN0bDAyJGNieElkBSdjdGwwMCRtaWRkbGVjb250ZW50JHJwdExpc3QkY3RsMDMkY2J4SWQFJ2N0bDAwJG1pZGRsZWNvbnRlbnQkcnB0TGlzdCRjdGwwNCRjYnhJZJUbUL345MMI0kzOqwpteqbHQo0f";
byte[] barray;
barray = Convert.FromBase64String(str);
UTF8Encoding utf8 = new UTF8Encoding();
Response.Write(utf8.GetString(barray));
结果如下:
�
-681859587dfdddfText 玩具分类d _!ItemCount0fdf785车系列 Carsddf801船系列 Boatsddf809飞机系列 Planesddf811飞碟系列 UFOddf812益智系列 Educationalddf813婴儿系列 Baby setddf814动漫系列 Cartoonddf815泡泡系列 Bubblesddf816设施系列 Establishmentd df817运动系列 Sportsd
df818武装系列 Military setd df819装饰系列 Ornamentsd df820通讯系列 Communicationd
df821乐器系列 Musicalddf822水机系列 Water gameddf823风扇系列 Fanddf824工具系列 Toolsddf825动物系列 Animalsddf826相机系列 Cameraddf827消防系列 Fire Engineddf828工程系列 Engineeringddf829自装玩具 DIYddf830文具系列 Stationeryddf831其他玩具 Other Toysd NavigateUrl>list.aspx?id=&brand=&num=&order=0&key_n=&key_p_max=&key_p_min=dd>list.aspx?id=&brand=&num=5&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=10&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=15&order=&key_n=&key_p_max=&key_p_min=dd
fd131680./upload/20090326014840585.jpgd131680电动军事艇加军人d CommandName131680dd131680254dozdd131694./upload/20090326014840366.jpgd131694 游泳镜d131694dd131694518dozdd131686./upload/20090326014841257.jpgd131696 游泳镜d131696dd131696524dozdd131700./upload/20090326014841892.jpgd131700 游泳镜d131700dd131700516dozd CurrentPageIndex Recordcount�)PageSizedd__ControlsRequirePostBackKey__'ctl00$middlecontent$rptList$ctl00$cbxId'ctl00$middlecontent$rptList$ctl01$cbxId'ctl00$middlecontent$rptList$ctl02$cbxId'ctl00$middlecontent$rptList$ctl03$cbxId'ctl00$middlecontent$rptList$ctl04$cbxId�P�����LΫ
这个大家可以在http://gallery.toysgogo.com/list.aspx这个页面中看到。
生成了这么多的一段东西,这段东西对seo一点好处也没有。而我要做的就是去掉它,但有一点,去掉但不能让它原来的控件和内容都发生变化,比如说不能使用等等。所以我要做的仅仅是用另一种方式去保存这些数据。这是一段用base64编码的数据而并不是加密,我很好奇到底放了些什么东西在这里面。下面我开始破解这段代码。代码如下:
复制代码 代码如下:
string str = "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";
byte[] barray;
barray = Convert.FromBase64String(str);
UTF8Encoding utf8 = new UTF8Encoding();
Response.Write(utf8.GetString(barray));
结果如下:
复制代码 代码如下:
�
-681859587dfdddfText 玩具分类d _!ItemCount0fdf785车系列 Carsddf801船系列 Boatsddf809飞机系列 Planesddf811飞碟系列 UFOddf812益智系列 Educationalddf813婴儿系列 Baby setddf814动漫系列 Cartoonddf815泡泡系列 Bubblesddf816设施系列 Establishmentd df817运动系列 Sportsd
df818武装系列 Military setd df819装饰系列 Ornamentsd df820通讯系列 Communicationd
df821乐器系列 Musicalddf822水机系列 Water gameddf823风扇系列 Fanddf824工具系列 Toolsddf825动物系列 Animalsddf826相机系列 Cameraddf827消防系列 Fire Engineddf828工程系列 Engineeringddf829自装玩具 DIYddf830文具系列 Stationeryddf831其他玩具 Other Toysd NavigateUrl>list.aspx?id=&brand=&num=&order=0&key_n=&key_p_max=&key_p_min=dd>list.aspx?id=&brand=&num=5&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=10&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=15&order=&key_n=&key_p_max=&key_p_min=dd
fd131680./upload/20090326014840585.jpgd131680电动军事艇加军人d CommandName131680dd131680254dozdd131694./upload/20090326014840366.jpgd131694 游泳镜d131694dd131694518dozdd131686./upload/20090326014841257.jpgd131696 游泳镜d131696dd131696524dozdd131700./upload/20090326014841892.jpgd131700 游泳镜d131700dd131700516dozd CurrentPageIndex Recordcount�)PageSizedd__ControlsRequirePostBackKey__'ctl00$middlecontent$rptList$ctl00$cbxId'ctl00$middlecontent$rptList$ctl01$cbxId'ctl00$middlecontent$rptList$ctl02$cbxId'ctl00$middlecontent$rptList$ctl03$cbxId'ctl00$middlecontent$rptList$ctl04$cbxId�P�����LΫ
这个大家可以在http://gallery.toysgogo.com/list.aspx这个页面中看到。
上一篇: 爆笑男女,什么是作死?
下一篇: Python3.6中那些很酷的特性
推荐阅读
-
ASP.NET中常用的三十三种代码第1/7页
-
asp.net下用url重写URLReWriter实现任意二级域名的方法第1/2页
-
ASP.net Forms验证Demo第1/3页
-
asp.net Web Services上传和下载文件(完整代码)第1/2页
-
ASP.NET页面进行GZIP压缩优化的几款压缩模块的使用简介及应用测试!(附源码)第1/2页
-
Asp.Net 通用数据操作类 (附通用数据基类)第1/2页
-
在asp.NET中字符串替换的五种方法第1/2页
-
ASP.NET缓存方法分析和实践示例代码第1/2页
-
asp.net xml序列化与反序列化第1/2页
-
asp.net一些很酷很实用的.Net技巧第1/2页