The View Source method explored by Darksoul
Quote:
Originally Posted by Darksoul
http://headtoscreencollision.blogspot.com/2009/01/extracting-flv-video-files-behind_01.html
|
Pornhub.com - A *cough*sexual educational*cough* website that displays, uhm... wonderful "reference material" about the subject, will be the target for this post.
We'll start with the normal routine, looking at the source of a typical video page:
Code:
http://www.pornhub.com/view_video.php?viewkey=16fd71ee4162d652d958
*** warning: this link contains adult oriented and/or sexually explicit material!
After perusing the source I stumbled upon this bit:
Code:
http://headtoscreencollision.blogspot.com/2009/01/extracting-flv-video-files-behind_01.html
Code:
var to = new SWFObject("http://www.pornhub.com/players/MX/v1/player_v1.4.swf", "player", "608", "476", "9.0.0", "#000000");
to.addParam("allowfullscreen", "true");
to.addVariable("options", "http%3A%2F%2Fwww.pornhub.com%2Fmx_player_config.php%3Fgateway%3Dd78fd12508f88e47ba8d64959ece5d46%26a%3D495d3157%26b%3D-1%26c%3D687591");
to.write("MxPlayerDiv");
Hmm... the 2nd value in addVariable() looks promising:
Code:
http%3A%2F%2Fwww.pornhub.com%2Fmx_player_config.php%3Fgateway%3Dd78fd12508f88e47ba8d64959ece5d46%26a%3D495d3157%26b%3D-1%26c%3D687591
Lets try that in the browser, but wait, we need to decode it first, try this decoder (unescape tool), this is the result:
Code:
http://www.pornhub.com/mx_player_config.php?gateway=d78fd12508f88e47ba8d64959ece5d46&a=495d3157&b=-1&c=687591
Ok, now in the browser he goes, and an xml file we get. The important stuff in the xml file is right at the start:
Code:
<options>
<show_watermark>0</show_watermark>
<auto_play>1</auto_play>
<flv_url>http://media1.pornhub.com/dl/06c357b4cefbb5ed8028fc0ffcc04292/495d33bc/videos/000/144/816/144816.flv</flv_url>
... some more xml down here ...
<flvurl> contains the important piece of info...
Task complete, next please
