VB Winsock 模拟发送 Http 协议头信息,VB Winsock 模拟发送 Http 协议信息,VB Winsock 模拟发送 Http 头信息,VB Winsock 模拟 Http 协议头信息,VB Winsock 发送 Http 协议头信息,VB Winsock 模拟发送 Http 协议头,VB Winsock 模拟发送 Http 信息,VB Winsock 模拟发送 Http 头,VB Winsock 发送 Http 协议头,VB Winsock 模拟 Http 协议头,VB Winsock 模拟 Http 信息,VB Winsock 发送 Http 信息,VB Winsock 发送 Http 头,VB Winsock 模拟 Http 头,VB Winsock 模拟 Http,VB Winsock 发送 Http,VB Winsock Http 头,VB Winsock Http,VB Http 头,VB Http,GET /api/api.php HTTP/1.1,Accept: */*,User-Agent: RMA/1.0 (compatible; RealMedia),Icy-MetaData: 1,Bandwidth: 1544000,ClientID: WinNT_5.1_6.0.12.1506_RealPlayer_R31CND_zh-CN_UNK,Language: zh-CN, zh, *,RegionData: 0,SupportsMaximumASMBandwidth: 1,Connection: Keep-Alive,Host: houyuan.itquan.com:80,Accept-Language: zh-CN, zh, *,Accept-Encoding: gzip。
VB Winsock 模拟发送 Http 协议头信息:
Dim SendStr As String
SendStr = "GET /api/api.php HTTP/1.1" & vbCrLf
SendStr = SendStr & "Accept: */*" & vbCrLf
SendStr = SendStr & "User-Agent: RMA/1.0 (compatible; RealMedia)" & vbCrLf
SendStr = SendStr & "Icy-MetaData: 1" & vbCrLf
SendStr = SendStr & "Bandwidth: 1544000" & vbCrLf
SendStr = SendStr & "ClientID: WinNT_5.1_6.0.12.1506_RealPlayer_R31CND_zh-CN_UNK" & vbCrLf
SendStr = SendStr & "Language: zh-CN, zh, *" & vbCrLf
SendStr = SendStr & "RegionData: 0" & vbCrLf
SendStr = SendStr & "SupportsMaximumASMBandwidth: 1" & vbCrLf
SendStr = SendStr & "Connection: Keep-Alive" & vbCrLf
SendStr = SendStr & "Host: houyuan.itquan.com:80" & vbCrLf
SendStr = SendStr & "Accept-Language: zh-CN, zh, *" & vbCrLf
SendStr = SendStr & "Accept-Encoding: gzip" & vbCrLf
SendStr = SendStr & vbCrLf
WinSock1.SendData SendStr |
文章作者
Nuclear'Atk
上次更新
2010-10-05
许可协议
Nuclear'Atk(核攻击)网络安全实验室版权所有,转载请注明出处。