Quote:
Originally Posted by saint825xtc
|
Using the same techniques that I used above, what you see when you look at the GET functions is that this is a bunch of text blocks that get plugged in Cascading Style Sheets to format them as a book.
So you get text that's coming in from a URL like:
http://openbook.hbgusa.com/openbook/...apter001.xhtml
. . . and you can use the same "fusking" trick that I used with the jpgs above, just plug it into halvar's CURL code, so that you iterate through the chapters, eg
..../chapter001.xhtml
..../chapter002.xhtml
. . . and so on.
You'll then have to some work to do if you want to format these the way they were in the original . . . you need to run these downloaded resources with the stylesheet they were using on the site, which is, I think
http://openbook.hbgusa.com/openbook/...stylesheet.css
. . . but I haven't checked that. In general these CSS pages have a lot of similar looking files, and it takes a bit of trial and error to identify which parts of the puzzle go where.
But its kinda fun. It is _not_ blackbelt hacking by any means, not really “hacking” at all — all you’re doing is saving stuff that the site is pushing to your machine. but you can get a lot done just by poking around the guts of a website. There are lots of sites which disable right click, for example, you can pretty much always find the resource they're hiding in the GETs
Same is true with some thumbnail gallery that something like Imagehost Grabber can't resolve-- you open the page and start looking through the Developer Tools Inspector to see just what gets called.