TypeError:对象不支持此属性或方法

JavaScript012

TypeError:对象不支持此属性或方法,第1张

IE中的脚本错误。

解决方法:

一、首先打开浏览器,然后单击右上角的小齿轮,在出现的对话框中,选择“Internet选项”以打开设置选项。

/iknow-pic.cdn.bcebos.com/54fbb2fb43166d220875c37e482309f79152d2de"target="_blank"title="点击查看大图"class="ikqb_img_alink">/iknow-pic.cdn.bcebos.com/54fbb2fb43166d220875c37e482309f79152d2de?x-bce-process=image%2Fresize%2Cm_lfit%2Cw_600%2Ch_800%2Climit_1%2Fquality%2Cq_85%2Fformat%2Cf_auto"esrc="https://iknow-pic.cdn.bcebos.com/54fbb2fb43166d220875c37e482309f79152d2de"/>

二、然后在弹出的“Internet选项设置”页面中单击“安全”,点击“单击”默认级别“。

/iknow-pic.cdn.bcebos.com/b8389b504fc2d56210010607e91190ef77c66ccb"target="_blank"title="点击查看大图"class="ikqb_img_alink">/iknow-pic.cdn.bcebos.com/b8389b504fc2d56210010607e91190ef77c66ccb?x-bce-process=image%2Fresize%2Cm_lfit%2Cw_600%2Ch_800%2Climit_1%2Fquality%2Cq_85%2Fformat%2Cf_auto"esrc="https://iknow-pic.cdn.bcebos.com/b8389b504fc2d56210010607e91190ef77c66ccb"/>

三、把ACTIVE选项下的各个选项都设为启用。

/iknow-pic.cdn.bcebos.com/6a600c338744ebf8409cb2d5d7f9d72a6159a76f"target="_blank"title="点击查看大图"class="ikqb_img_alink">/iknow-pic.cdn.bcebos.com/6a600c338744ebf8409cb2d5d7f9d72a6159a76f?x-bce-process=image%2Fresize%2Cm_lfit%2Cw_600%2Ch_800%2Climit_1%2Fquality%2Cq_85%2Fformat%2Cf_auto"esrc="https://iknow-pic.cdn.bcebos.com/6a600c338744ebf8409cb2d5d7f9d72a6159a76f"/>

四、单击“默认级别”后,单击右下角的“应用”。

/iknow-pic.cdn.bcebos.com/023b5bb5c9ea15ce5e0737e3b8003af33b87b26b"target="_blank"title="点击查看大图"class="ikqb_img_alink">/iknow-pic.cdn.bcebos.com/023b5bb5c9ea15ce5e0737e3b8003af33b87b26b?x-bce-process=image%2Fresize%2Cm_lfit%2Cw_600%2Ch_800%2Climit_1%2Fquality%2Cq_85%2Fformat%2Cf_auto"esrc="https://iknow-pic.cdn.bcebos.com/023b5bb5c9ea15ce5e0737e3b8003af33b87b26b"/>

五、切换回“高级”选项卡并勾选前两项“禁用脚本调试(InternetExplorer)”和“禁用脚本调试(其他)”。

/iknow-pic.cdn.bcebos.com/838ba61ea8d3fd1f82d275d03e4e251f94ca5f05"target="_blank"title="点击查看大图"class="ikqb_img_alink">/iknow-pic.cdn.bcebos.com/838ba61ea8d3fd1f82d275d03e4e251f94ca5f05?x-bce-process=image%2Fresize%2Cm_lfit%2Cw_600%2Ch_800%2Climit_1%2Fquality%2Cq_85%2Fformat%2Cf_auto"esrc="https://iknow-pic.cdn.bcebos.com/838ba61ea8d3fd1f82d275d03e4e251f94ca5f05"/>

六、完成挂钩后,单击右下角的“应用”,即可。

/iknow-pic.cdn.bcebos.com/6d81800a19d8bc3e0cf7d1208c8ba61ea9d34559"target="_blank"title="点击查看大图"class="ikqb_img_alink">/iknow-pic.cdn.bcebos.com/6d81800a19d8bc3e0cf7d1208c8ba61ea9d34559?x-bce-process=image%2Fresize%2Cm_lfit%2Cw_600%2Ch_800%2Climit_1%2Fquality%2Cq_85%2Fformat%2Cf_auto"esrc="https://iknow-pic.cdn.bcebos.com/6d81800a19d8bc3e0cf7d1208c8ba61ea9d34559"/>

答:首先要截获检测函数的动态代码,动态执行js代码有两种方法,一是eval,二是function。

现在很多网站都上了各种前端反爬手段,无论手段如何,最重要的是要把包含反爬手段的前端javascript代码加密隐藏起来,然后在运行时实时解密动态执行。

动态执行js代码无非两种方法,即eval和Function。那么,不管网站加密代码写的多牛,我们只要将这两个方法hook住,即可获取到解密后的可执行js代码。

注意,有些网站会检测eval和Function这两个方法是否原生,因此需要一些小花招来忽悠过去