<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: MoBiC-08: logical CAPTCHA bypass</title>
	<link>http://websecurity.com.ua/1520/</link>
	<description></description>
	<pubDate>Thu, 09 Apr 2026 13:35:22 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1520/#comment-79874</link>
		<pubDate>Tue, 13 Nov 2007 01:03:28 +0000</pubDate>
		<guid>http://websecurity.com.ua/1520/#comment-79874</guid>
					<description>&lt;blockquote&gt;You’re completely missing out on the real purpose of a captcha like Christian’s. It relies on the fact that no spammer is going to tailor his spamming scripts to suit one particular site with an unusual captcha.&lt;/blockquote&gt;
Dude, I'm not missing out real purpose of logical capchas. I understand what purposes Christian and many others people have when using this type of captcha, but I'm talking about other side - a security side of this captcha (because security is object of any captcha). And in case of logical captchas security is very poor. So I'm talking about security, not accessibility, because MoBiC is security project and it's security site.

Accessibility and security is double-edged sword, and people need to choose right solution. But balance can be achived. And independently of what you chose, you always need to attend to security. In case of such logical captchas it's not possible, because they are insecure. Spammers can make solution for single site, if it's popular enough, and spammers can make database of unusual captchas, to share their knowledge about bypassing such captchas (and in logical type it is very easy to do). Also for spammers not hard to make advanced bot which will be hacking many logical captchas by content analysis (because they are easy ones). And in case if not spammers, but others bad guys will go to your site, they easily bypass your logical captcha (independently of its originality). And they'll attack your site hard with automated requests, because it's vulnerability if you have no or poor anti-automation protection. So like I'm trying to tell you and Internet community - attend to security of your site.

&lt;blockquote&gt;And just to finish this off: Your captcha is vulnerable as well because human labour is cheap. And yours is dead easy to beat in software as well.&lt;/blockquote&gt;
Marco, I know that my captcha can be bypassed by cheap work force and by OCR, but the main thing, that my version has no bypassing vulnerabilities (after I remade it). And it's still very effective solution (which proved itself).

As I wrote at my site before and as said &lt;a href="http://en.wikipedia.org/wiki/Captcha" target="_blank" rel="nofollow"&gt;Wikipedia&lt;/a&gt; there are three types of bypassing: Human solvers (work force), Computer character recognition (OCR) and Insecure implementation (vulnerabilities). In my &lt;a href="/1492/" rel="nofollow"&gt;Month of Bugs in Captchas&lt;/a&gt; I'm talking only about third type of bypassing - vulnerabilities in captchas. So you missed main idea of my project - insecure implemented captchas. Which can be bypassed (with my methods) more quickly and cheaper, and so more effective, than with using work force or OCR.

&lt;blockquote&gt;Gonna write a bulletin about that as well?&lt;/blockquote&gt;
No. I'll not write about work force and OCR methods of bypassing, only about vulnerabilities in captchas directly. Which allow bots to bypass captchas for different automated activity. The topic about insecure implemented captchas is little known, so I'm reminding about it to Internet community.</description>
		<content:encoded><![CDATA[<blockquote><p>You’re completely missing out on the real purpose of a captcha like Christian’s. It relies on the fact that no spammer is going to tailor his spamming scripts to suit one particular site with an unusual captcha.</p></blockquote>
<p>Dude, I&#8217;m not missing out real purpose of logical capchas. I understand what purposes Christian and many others people have when using this type of captcha, but I&#8217;m talking about other side - a security side of this captcha (because security is object of any captcha). And in case of logical captchas security is very poor. So I&#8217;m talking about security, not accessibility, because MoBiC is security project and it&#8217;s security site.</p>
<p>Accessibility and security is double-edged sword, and people need to choose right solution. But balance can be achived. And independently of what you chose, you always need to attend to security. In case of such logical captchas it&#8217;s not possible, because they are insecure. Spammers can make solution for single site, if it&#8217;s popular enough, and spammers can make database of unusual captchas, to share their knowledge about bypassing such captchas (and in logical type it is very easy to do). Also for spammers not hard to make advanced bot which will be hacking many logical captchas by content analysis (because they are easy ones). And in case if not spammers, but others bad guys will go to your site, they easily bypass your logical captcha (independently of its originality). And they&#8217;ll attack your site hard with automated requests, because it&#8217;s vulnerability if you have no or poor anti-automation protection. So like I&#8217;m trying to tell you and Internet community - attend to security of your site.</p>
<blockquote><p>And just to finish this off: Your captcha is vulnerable as well because human labour is cheap. And yours is dead easy to beat in software as well.</p></blockquote>
<p>Marco, I know that my captcha can be bypassed by cheap work force and by OCR, but the main thing, that my version has no bypassing vulnerabilities (after I remade it). And it&#8217;s still very effective solution (which proved itself).</p>
<p>As I wrote at my site before and as said <a href="http://en.wikipedia.org/wiki/Captcha" target="_blank" rel="nofollow">Wikipedia</a> there are three types of bypassing: Human solvers (work force), Computer character recognition (OCR) and Insecure implementation (vulnerabilities). In my <a href="/1492/" rel="nofollow">Month of Bugs in Captchas</a> I&#8217;m talking only about third type of bypassing - vulnerabilities in captchas. So you missed main idea of my project - insecure implemented captchas. Which can be bypassed (with my methods) more quickly and cheaper, and so more effective, than with using work force or OCR.</p>
<blockquote><p>Gonna write a bulletin about that as well?</p></blockquote>
<p>No. I&#8217;ll not write about work force and OCR methods of bypassing, only about vulnerabilities in captchas directly. Which allow bots to bypass captchas for different automated activity. The topic about insecure implemented captchas is little known, so I&#8217;m reminding about it to Internet community.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1520/#comment-79621</link>
		<pubDate>Mon, 12 Nov 2007 21:57:43 +0000</pubDate>
		<guid>http://websecurity.com.ua/1520/#comment-79621</guid>
					<description>&lt;blockquote&gt;Do you really think anyone (including Christian) thought this ‘captcha’ is unbeatable?&lt;/blockquote&gt;
&lt;strong&gt;Marco&lt;/strong&gt;

There are many vulnerable captchas in Interent. They are different types: image, text and logical, but every of them if have holes can be bypassed. So I'm talking in Month of Bugs in Captchas about vulnerabilities in different captchas. Including logical (as I wrote in this article).

Most people think captcha is effective solution (different types of captchas - people like different captchas, and use various ones for different porposes, but protection is main object of any captcha). In reality there are a lot of vulnerable captchas. Which can be byppased by bad guys - to spam at your site and to do any automated activity. So in my project I'm openning eyes of Internet community (and Christian and every user of logical captchas also) on this situation.

And if you don't like any post at my site, just don't read it. No need to write dissatisfactions in comments. It's your decision.</description>
		<content:encoded><![CDATA[<blockquote><p>Do you really think anyone (including Christian) thought this ‘captcha’ is unbeatable?</p></blockquote>
<p><strong>Marco</strong></p>
<p>There are many vulnerable captchas in Interent. They are different types: image, text and logical, but every of them if have holes can be bypassed. So I&#8217;m talking in Month of Bugs in Captchas about vulnerabilities in different captchas. Including logical (as I wrote in this article).</p>
<p>Most people think captcha is effective solution (different types of captchas - people like different captchas, and use various ones for different porposes, but protection is main object of any captcha). In reality there are a lot of vulnerable captchas. Which can be byppased by bad guys - to spam at your site and to do any automated activity. So in my project I&#8217;m openning eyes of Internet community (and Christian and every user of logical captchas also) on this situation.</p>
<p>And if you don&#8217;t like any post at my site, just don&#8217;t read it. No need to write dissatisfactions in comments. It&#8217;s your decision.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Marco</title>
		<link>http://websecurity.com.ua/1520/#comment-78792</link>
		<pubDate>Sun, 11 Nov 2007 23:40:46 +0000</pubDate>
		<guid>http://websecurity.com.ua/1520/#comment-78792</guid>
					<description>Dude, this is a retarded 'security bulletin'. Do you really think anyone (including Christian) thought this 'captcha' is unbeatable? 

You're completely missing out on the real purpose of a captcha like Christian's. It relies on the fact that no spammer is going to tailor his spamming scripts to suit one particular site with an unusual captcha. And guess what? That approach works remarkably well!

And just to finish this off: Your captcha is &lt;a href="http://www.i-marco.nl/weblog/archive/2007/10/21/are_blog_comments_dead" rel="nofollow"&gt;vulnerable as well&lt;/a&gt; because human labour is cheap. And yours is dead easy to beat in software as well.

Gonna write a bulletin about that as well?</description>
		<content:encoded><![CDATA[<p>Dude, this is a retarded &#8217;security bulletin&#8217;. Do you really think anyone (including Christian) thought this &#8216;captcha&#8217; is unbeatable? </p>
<p>You&#8217;re completely missing out on the real purpose of a captcha like Christian&#8217;s. It relies on the fact that no spammer is going to tailor his spamming scripts to suit one particular site with an unusual captcha. And guess what? That approach works remarkably well!</p>
<p>And just to finish this off: Your captcha is <a href="http://www.i-marco.nl/weblog/archive/2007/10/21/are_blog_comments_dead" rel="nofollow">vulnerable as well</a> because human labour is cheap. And yours is dead easy to beat in software as well.</p>
<p>Gonna write a bulletin about that as well?
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1520/#comment-77680</link>
		<pubDate>Sat, 10 Nov 2007 17:14:35 +0000</pubDate>
		<guid>http://websecurity.com.ua/1520/#comment-77680</guid>
					<description>&lt;blockquote&gt;If I have to spend 90% of my time securing this system I might as well not do it.&lt;/blockquote&gt;
You just use insecure captcha, because of lack of knowledge. And I opened your eyes on that. This is main task of my project - to help people to understand, that captchas not so secure and there are a lot of unreliable captchas. And for protecting from bad guys they need more reliable protection.

&lt;blockquote&gt;On the other hand, if you tell me what can be done to avoid this automated submission, I’ll be happy to write about it and give you the credit advertising you as a security expert in this case.&lt;/blockquote&gt;
Chris I will certainly help you - it's my work to make Web more secure and I'll give you required information. For you, because you are not captcha developer, I give info how to protect yourself and your site from spam - you just need more reliable captcha. Man, don't worry - all spammers who will attack your site will have to do with me. We'll kick out them from your site.

&lt;blockquote&gt;I give up things for free to make the web a better place, do you?&lt;/blockquote&gt;
Yes, I do. All my security work (published at my site) and social security audit that I do every day is doing for free - to make Internet better and secure place. And my previous project &lt;a href="/category/moseb/" rel="nofollow"&gt;Month of Search Engines Bugs&lt;/a&gt; and my new project Month of Bugs in Captchas also designed for this purpose.

So, Chris, if you want, I'll suggest you real solutions (on which you can look) for protecting from spammers and recommend you reliable captcha.</description>
		<content:encoded><![CDATA[<blockquote><p>If I have to spend 90% of my time securing this system I might as well not do it.</p></blockquote>
<p>You just use insecure captcha, because of lack of knowledge. And I opened your eyes on that. This is main task of my project - to help people to understand, that captchas not so secure and there are a lot of unreliable captchas. And for protecting from bad guys they need more reliable protection.</p>
<blockquote><p>On the other hand, if you tell me what can be done to avoid this automated submission, I’ll be happy to write about it and give you the credit advertising you as a security expert in this case.</p></blockquote>
<p>Chris I will certainly help you - it&#8217;s my work to make Web more secure and I&#8217;ll give you required information. For you, because you are not captcha developer, I give info how to protect yourself and your site from spam - you just need more reliable captcha. Man, don&#8217;t worry - all spammers who will attack your site will have to do with me. We&#8217;ll kick out them from your site.</p>
<blockquote><p>I give up things for free to make the web a better place, do you?</p></blockquote>
<p>Yes, I do. All my security work (published at my site) and social security audit that I do every day is doing for free - to make Internet better and secure place. And my previous project <a href="/category/moseb/" rel="nofollow">Month of Search Engines Bugs</a> and my new project Month of Bugs in Captchas also designed for this purpose.</p>
<p>So, Chris, if you want, I&#8217;ll suggest you real solutions (on which you can look) for protecting from spammers and recommend you reliable captcha.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1520/#comment-77679</link>
		<pubDate>Sat, 10 Nov 2007 16:46:13 +0000</pubDate>
		<guid>http://websecurity.com.ua/1520/#comment-77679</guid>
					<description>&lt;strong&gt;Chris&lt;/strong&gt;

This is a project. And you (with your old captcha) became participant of it after you started to use that vulnerable captcha. If you look at the &lt;a href="/1492/" rel="nofollow"&gt;project description&lt;/a&gt; you'll see, that participation in the project are voluntary - I voluntarily chose participants for the project ;-). So it's a fate, man. And all info posted in full disclosure, so you have all details freely available.

I can understand you Chris, that you not too happy with this (you don't need additional spam at your site after details of hole was posted), but you chose this way after you put that lame captcha at your site. And after I informed you about that, you removed that vulnerable captcha (when upgraded your site's engine) and now you need new and secure one. So now you in even more risk because you have no captchas at all.

And now my disclosure not giving any new info for bad guys to spam your comments, because there are no more that capctha. Now this is just educational material. But you need to protect your site. And I'll help you.

&lt;blockquote&gt;I am paid to share my knowledge and I am using my blog as a free outlet to give to people what I consider should be free. You are pissing all over this attacking a system I didn’t develop.&lt;/blockquote&gt;
I'm also mostly do all my work for free - share my knowledge and informing people and web app developers about holes in their sites and software. And working everyday to make Web more secure. I'm not talking about attacking you directly, but holes in software that you use (about such type of captchas - your site is just an example). So your fault is that you used that bad captcha, and I'll help you to fix this.</description>
		<content:encoded><![CDATA[<p><strong>Chris</strong></p>
<p>This is a project. And you (with your old captcha) became participant of it after you started to use that vulnerable captcha. If you look at the <a href="/1492/" rel="nofollow">project description</a> you&#8217;ll see, that participation in the project are voluntary - I voluntarily chose participants for the project <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> . So it&#8217;s a fate, man. And all info posted in full disclosure, so you have all details freely available.</p>
<p>I can understand you Chris, that you not too happy with this (you don&#8217;t need additional spam at your site after details of hole was posted), but you chose this way after you put that lame captcha at your site. And after I informed you about that, you removed that vulnerable captcha (when upgraded your site&#8217;s engine) and now you need new and secure one. So now you in even more risk because you have no captchas at all.</p>
<p>And now my disclosure not giving any new info for bad guys to spam your comments, because there are no more that capctha. Now this is just educational material. But you need to protect your site. And I&#8217;ll help you.</p>
<blockquote><p>I am paid to share my knowledge and I am using my blog as a free outlet to give to people what I consider should be free. You are pissing all over this attacking a system I didn’t develop.</p></blockquote>
<p>I&#8217;m also mostly do all my work for free - share my knowledge and informing people and web app developers about holes in their sites and software. And working everyday to make Web more secure. I&#8217;m not talking about attacking you directly, but holes in software that you use (about such type of captchas - your site is just an example). So your fault is that you used that bad captcha, and I&#8217;ll help you to fix this.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Chris Heilmann</title>
		<link>http://websecurity.com.ua/1520/#comment-76755</link>
		<pubDate>Fri, 09 Nov 2007 18:41:37 +0000</pubDate>
		<guid>http://websecurity.com.ua/1520/#comment-76755</guid>
					<description>While I am bowing down to your superior knowledge about securing systems I am not happy at all about you publishing a way to inject unwanted comments into my blog.

I am paid to share my knowledge and I am using my blog as a free outlet to give to people what I consider should be free. You are pissing all over this attacking a system I didn't develop.

If I have to spend 90% of my time securing this system I might as well not do it.

On the other hand, if you tell me what can be done to avoid this automated submission, I'll be happy to write about it and give you the credit advertising you as a security expert in this case. 

I give up things for free to make the web a better place, do you?</description>
		<content:encoded><![CDATA[<p>While I am bowing down to your superior knowledge about securing systems I am not happy at all about you publishing a way to inject unwanted comments into my blog.</p>
<p>I am paid to share my knowledge and I am using my blog as a free outlet to give to people what I consider should be free. You are pissing all over this attacking a system I didn&#8217;t develop.</p>
<p>If I have to spend 90% of my time securing this system I might as well not do it.</p>
<p>On the other hand, if you tell me what can be done to avoid this automated submission, I&#8217;ll be happy to write about it and give you the credit advertising you as a security expert in this case. </p>
<p>I give up things for free to make the web a better place, do you?
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
