<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: MoBiC-01: learnwpf.com CAPTCHA bypass</title>
	<link>http://websecurity.com.ua/1494/</link>
	<description></description>
	<pubDate>Thu, 09 Apr 2026 12:04:34 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: JosephCooney</title>
		<link>http://websecurity.com.ua/1494/#comment-85926</link>
		<pubDate>Wed, 28 Nov 2007 11:38:12 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-85926</guid>
					<description>OK, I take back the spammer part - I don't know what IP address(es) you're coming from so I don't/didn't know if it was you or not. I'll remove the fsck thing next time I redeploy my site (which if you can punch a hole in my CAPTCHA will be soon, to remove the capability to leave comments altogether). I don't see how I can become "more serious".</description>
		<content:encoded><![CDATA[<p>OK, I take back the spammer part - I don&#8217;t know what IP address(es) you&#8217;re coming from so I don&#8217;t/didn&#8217;t know if it was you or not. I&#8217;ll remove the fsck thing next time I redeploy my site (which if you can punch a hole in my CAPTCHA will be soon, to remove the capability to leave comments altogether). I don&#8217;t see how I can become &#8220;more serious&#8221;.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1494/#comment-84459</link>
		<pubDate>Sun, 18 Nov 2007 21:32:18 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-84459</guid>
					<description>&lt;blockquote&gt;I assure you I’m taking this seriously&lt;/blockquote&gt;
Joseph, it is good that you taking this serious (but it can be more serious). I am glad that you improved your captcha (fix one of two vulnerabilities). And as I see you are interested (slightly, but still interested) in additional improving of your captcha. For this time only four man (including you) from participants responded me (those people who more seriously attend to security of their sites).

About fsck command. It is good that you like this system utility, but the phrase which you used in your new captcha looks provoking for me. So it's better to not use such phrase.

&lt;blockquote&gt;In all seriousness though, posting spam to my site does annoy me a little.&lt;/blockquote&gt;
Man, I was not spamming at your site. Only informed you about the hole and made some test posts to test captcha bypass methods (for 1st and 2nd versions of captcha). It's sad to hear that my posts with alert about holes in your captcha and time which I spent to inform you was count by you as spam. From my side was no spam activity.

So before we continue to speak about your captcha you need to do the next required steps:

1. Become more serious - this mean that you must stop saying userious things about me and my site (stop blaming me in those things which I didn't do).

2. Make excuses about blaming me as spammer - which I am not (never was occupied with such activity).

3. Remove "fsck phrase" from your new captcha.

&lt;blockquote&gt;Unreasonable?&lt;/blockquote&gt;
It's quite possible. But, Joseph, before we continue you need to do aforesaid required steps. It is better to respect other's time.</description>
		<content:encoded><![CDATA[<blockquote><p>I assure you I’m taking this seriously</p></blockquote>
<p>Joseph, it is good that you taking this serious (but it can be more serious). I am glad that you improved your captcha (fix one of two vulnerabilities). And as I see you are interested (slightly, but still interested) in additional improving of your captcha. For this time only four man (including you) from participants responded me (those people who more seriously attend to security of their sites).</p>
<p>About fsck command. It is good that you like this system utility, but the phrase which you used in your new captcha looks provoking for me. So it&#8217;s better to not use such phrase.</p>
<blockquote><p>In all seriousness though, posting spam to my site does annoy me a little.</p></blockquote>
<p>Man, I was not spamming at your site. Only informed you about the hole and made some test posts to test captcha bypass methods (for 1st and 2nd versions of captcha). It&#8217;s sad to hear that my posts with alert about holes in your captcha and time which I spent to inform you was count by you as spam. From my side was no spam activity.</p>
<p>So before we continue to speak about your captcha you need to do the next required steps:</p>
<p>1. Become more serious - this mean that you must stop saying userious things about me and my site (stop blaming me in those things which I didn&#8217;t do).</p>
<p>2. Make excuses about blaming me as spammer - which I am not (never was occupied with such activity).</p>
<p>3. Remove &#8220;fsck phrase&#8221; from your new captcha.</p>
<blockquote><p>Unreasonable?</p></blockquote>
<p>It&#8217;s quite possible. But, Joseph, before we continue you need to do aforesaid required steps. It is better to respect other&#8217;s time.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: JosephCooney</title>
		<link>http://websecurity.com.ua/1494/#comment-80437</link>
		<pubDate>Wed, 14 Nov 2007 18:50:10 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-80437</guid>
					<description>&#62; Joseph if you continue to talk unserious things about me and my site 
&#62; (especially vulgar things, like in your new captcha), I’ll stop speaking 
&#62; with you - to not waste your time, nor my time. So try to be serious 
&#62; man. 

I assure you I'm taking this seriously - otherwise why would I have taken the time to change my implementation? As for my new CAPTCHA...fsck is a unix command, I can't imagine what you were thinking about. In all seriousness though, posting spam to my site does annoy me a little. If you're going to do stuff like that at least expect a little push back.</description>
		<content:encoded><![CDATA[<p>&gt; Joseph if you continue to talk unserious things about me and my site<br />
&gt; (especially vulgar things, like in your new captcha), I’ll stop speaking<br />
&gt; with you - to not waste your time, nor my time. So try to be serious<br />
&gt; man. </p>
<p>I assure you I&#8217;m taking this seriously - otherwise why would I have taken the time to change my implementation? As for my new CAPTCHA&#8230;fsck is a unix command, I can&#8217;t imagine what you were thinking about. In all seriousness though, posting spam to my site does annoy me a little. If you&#8217;re going to do stuff like that at least expect a little push back.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: JosephCooney</title>
		<link>http://websecurity.com.ua/1494/#comment-80435</link>
		<pubDate>Wed, 14 Nov 2007 18:15:58 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-80435</guid>
					<description>I'm somewhat suspicious of the level of automation you're achieving because of the times that these comments were posted - they're all between 10 and 20 seconds apart. I will totally concede that my previous CAPTCHA implementation was “breakable” (or maybe even broken by design) - for all I know this one could also be, but I think it's put-up-or-shut-up time for you guys. All I've seen from you so far is a link to a form on my site with some pre-populated values (it looks like from the state of the form that it has just attempted an HTTP POST which has failed....funnily enough because of an invalid CAPTCHA). This would be totally trivial in WatiN/R, greasemonkey or whatever. I'd like to see from them one of the following:

   1. a textual description of how either the CAPTCHA can be bypassed altogether, or how the CAPTCHA value can be programmatically determined from the page/cookies/http traffic/phase of the moon/whatever - like “we take this value from the cookie your site sets, do an MD5 hash of it, salt the hash and then smoke it....”
   2. a script that will post comments to my site with no human intervention
   3. 50+ comments on a single page inside of 10 seconds, or some number that would be infeasible for a human to do, originating from a single IP address.

Unreasonable?</description>
		<content:encoded><![CDATA[<p>I&#8217;m somewhat suspicious of the level of automation you&#8217;re achieving because of the times that these comments were posted - they&#8217;re all between 10 and 20 seconds apart. I will totally concede that my previous CAPTCHA implementation was “breakable” (or maybe even broken by design) - for all I know this one could also be, but I think it&#8217;s put-up-or-shut-up time for you guys. All I&#8217;ve seen from you so far is a link to a form on my site with some pre-populated values (it looks like from the state of the form that it has just attempted an HTTP POST which has failed&#8230;.funnily enough because of an invalid CAPTCHA). This would be totally trivial in WatiN/R, greasemonkey or whatever. I&#8217;d like to see from them one of the following:</p>
<p>   1. a textual description of how either the CAPTCHA can be bypassed altogether, or how the CAPTCHA value can be programmatically determined from the page/cookies/http traffic/phase of the moon/whatever - like “we take this value from the cookie your site sets, do an MD5 hash of it, salt the hash and then smoke it&#8230;.”<br />
   2. a script that will post comments to my site with no human intervention<br />
   3. 50+ comments on a single page inside of 10 seconds, or some number that would be infeasible for a human to do, originating from a single IP address.</p>
<p>Unreasonable?
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1494/#comment-80433</link>
		<pubDate>Wed, 14 Nov 2007 17:31:03 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-80433</guid>
					<description>&lt;strong&gt;Joseph&lt;/strong&gt;

As I looked at your new captcha and tested it, I can establish that your captcha still vulnerable.

It's good that you remade your captcha. Main object of my project Month of Bugs in Captchas is to inform web developers and Internet community about vulnerabilities in captchas, and to push web developers to make more secure captchas (to remake current or to make new ones). So you did that you need to do. And now your captcha not vulnerable for one of two bypass method. But it's still vulnerable.

Like I wrote in my article, your captcha is vulnerable for two methods: Guessing from URL bypass method and MustLive CAPTCHA bypass method (Advanced version). You fixed first bypassing method in you captcha, but there is the second. So the same exploit is still work (because it was made with second bypass method). As I wrote, better to use not first method (guessing), but my advanced method to hack this captcha (which shown in the exploit). And this method easily bypass your new captcha, like old one - it's very effective method.

So you need more reliable captcha.

P.S.

Joseph if you continue to talk unserious things about me and my site (especially vulgar things, like in your new captcha), I'll stop speaking with you - to not waste your time, nor my time. So try to be serious man.</description>
		<content:encoded><![CDATA[<p><strong>Joseph</strong></p>
<p>As I looked at your new captcha and tested it, I can establish that your captcha still vulnerable.</p>
<p>It&#8217;s good that you remade your captcha. Main object of my project Month of Bugs in Captchas is to inform web developers and Internet community about vulnerabilities in captchas, and to push web developers to make more secure captchas (to remake current or to make new ones). So you did that you need to do. And now your captcha not vulnerable for one of two bypass method. But it&#8217;s still vulnerable.</p>
<p>Like I wrote in my article, your captcha is vulnerable for two methods: Guessing from URL bypass method and MustLive CAPTCHA bypass method (Advanced version). You fixed first bypassing method in you captcha, but there is the second. So the same exploit is still work (because it was made with second bypass method). As I wrote, better to use not first method (guessing), but my advanced method to hack this captcha (which shown in the exploit). And this method easily bypass your new captcha, like old one - it&#8217;s very effective method.</p>
<p>So you need more reliable captcha.</p>
<p>P.S.</p>
<p>Joseph if you continue to talk unserious things about me and my site (especially vulgar things, like in your new captcha), I&#8217;ll stop speaking with you - to not waste your time, nor my time. So try to be serious man.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1494/#comment-80431</link>
		<pubDate>Wed, 14 Nov 2007 15:25:43 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-80431</guid>
					<description>OK, Joseph, I'll look at your new captcha.</description>
		<content:encoded><![CDATA[<p>OK, Joseph, I&#8217;ll look at your new captcha.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: JosephCooney</title>
		<link>http://websecurity.com.ua/1494/#comment-80420</link>
		<pubDate>Tue, 13 Nov 2007 23:10:00 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-80420</guid>
					<description>I look forward to seeing how you go about breaking my new CAPTCHA</description>
		<content:encoded><![CDATA[<p>I look forward to seeing how you go about breaking my new CAPTCHA
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1494/#comment-80204</link>
		<pubDate>Tue, 13 Nov 2007 15:54:18 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-80204</guid>
					<description>&lt;strong&gt;Joseph&lt;/strong&gt;

Captcha at your site is very unsecure (it is vulnerable for two methods of bypassing as I wrote). So you and Darren need to develop new (or remade current) more secure one. In any case use only reliable captcha at your site.

It was temporary that your captcha was effective in blocking spam. Untill spammers would make solutition for your specific captcha or made advanced bot which will be bypassing all captchas with such holes. And it will not save from direct attack by bad guys. It's vulnerability if you have no or poor anti-automation protection at your site. And I'm informing you and whole Internet community about such vulnerabilities.

&lt;blockquote&gt;Captcha doesn’t have to be very sophisticated to be effective&lt;/blockquote&gt;
Captcha must be secure, to be effective (from spammers and others bad guys). As I wrote in &lt;a href="/1520/#comment-79874" rel="nofollow"&gt;comment&lt;/a&gt;, there are three types of bypassing: work force, OCR and insecure implementation (vulnerabilities). In my Month of Bugs in Captchas I’m talking only about vulnerabilities in captchas.

Besides, captcha at codinghorror.com is vulnerable for &lt;a href="/1501/" rel="nofollow"&gt;constant values bypass method&lt;/a&gt; (this captcha has only one value). They also need more reliable captcha.</description>
		<content:encoded><![CDATA[<p><strong>Joseph</strong></p>
<p>Captcha at your site is very unsecure (it is vulnerable for two methods of bypassing as I wrote). So you and Darren need to develop new (or remade current) more secure one. In any case use only reliable captcha at your site.</p>
<p>It was temporary that your captcha was effective in blocking spam. Untill spammers would make solutition for your specific captcha or made advanced bot which will be bypassing all captchas with such holes. And it will not save from direct attack by bad guys. It&#8217;s vulnerability if you have no or poor anti-automation protection at your site. And I&#8217;m informing you and whole Internet community about such vulnerabilities.</p>
<blockquote><p>Captcha doesn’t have to be very sophisticated to be effective</p></blockquote>
<p>Captcha must be secure, to be effective (from spammers and others bad guys). As I wrote in <a href="/1520/#comment-79874" rel="nofollow">comment</a>, there are three types of bypassing: work force, OCR and insecure implementation (vulnerabilities). In my Month of Bugs in Captchas I’m talking only about vulnerabilities in captchas.</p>
<p>Besides, captcha at codinghorror.com is vulnerable for <a href="/1501/" rel="nofollow">constant values bypass method</a> (this captcha has only one value). They also need more reliable captcha.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: JosephCooney</title>
		<link>http://websecurity.com.ua/1494/#comment-80200</link>
		<pubDate>Tue, 13 Nov 2007 11:36:11 +0000</pubDate>
		<guid>http://websecurity.com.ua/1494/#comment-80200</guid>
					<description>I didn't write the code learnwpf runs on - it was written by my friend Darren Neimke as part of his "single user blog" project. It is a deliberately naive implementation that (until I was featured on your site) has been very effective in blocking comment spam. Captcha doesn't have to be very sophisticated to be effective http://www.codinghorror.com/blog/archives/000712.html</description>
		<content:encoded><![CDATA[<p>I didn&#8217;t write the code learnwpf runs on - it was written by my friend Darren Neimke as part of his &#8220;single user blog&#8221; project. It is a deliberately naive implementation that (until I was featured on your site) has been very effective in blocking comment spam. Captcha doesn&#8217;t have to be very sophisticated to be effective <a href="http://www.codinghorror.com/blog/archives/000712.html" rel="nofollow">http://www.codinghorror.com/blog/archives/000712.html</a>
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
