SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Security Risks with Using
CAPTCHAs
Final Project CS854 Fall 2006
Presented by Allan Caine
December 4, 2006
Allan Caine 2
Outline
Background
Our Proposed Model and Why
Multi-point attack
Attacking “Repeaters”
Allan Caine 3
Background
Password/authentication
System
Human called the Prover
Generally succeeds
Bot called the Prover
Generally fails
Server/System
CAPTCHA called the Verifier
Allan Caine 4
Current Paradigm
Purchase
RequestKey: k
challenge
E-commerce web site.
Bot
CAPTCHA
Server
CGI: k
CGI: k
Expects
3882948
Allan Caine 5
Proposed Model
E-commerce web site. BotCAPTCHA
Server
The attacker cannot perceive the
presence of a third party.
Allan Caine 6
Example
Pre-sale
advertising
Transaction
Processing
Allan Caine 7
Consequence:
Multi-point Attack
The resemblance is
uncanny. Both use
the same 3rd
party
CAPTCHA provider,
audienceview.com.
Breaking one
CAPTCHA, breaks
both sites. Attacker
has two points of
attack and more
incentive to attempt
the attack.
Allan Caine 8
All of these Sites are
Compromised!
www.tickets.com
And many other
non-baseball sites
Allan Caine 9
Attacking Repeaters
Purchase
RequestKey: k
challenge
E-commerce web site.
MLB & yourtube.com
Bot
CAPTCHA
Server
CGI: k
CGI: k
Expects
3882948
Allan Caine 10
Two Basic Steps
Learn off-line
Attack on-line
Allan Caine 11
1st
Step:
Learn Off-line
Clipped
Cleaned
Templates
Allan Caine 12
2nd
Step:
Attack On-line
Sub-steps
Pre-process the CAPTCHA
Correlate and Vote
Allan Caine 13
Preprocess
K-means analysis Segregation
Targets
Allan Caine 14
Correlate and Vote
Best Match!
Usually, we get a correct match.
Occasionally, due to image
noise in the target, we get a
spurious result.
No problem! We ask the
CAPTCHA server for another
image with the same solution.
We try again to cross check our
work.
Allan Caine 15
“Election” Results
The digit getting the
most votes for a
particular position
“wins” the election
and is our choice for
the solution.
Allan Caine 16
So What?
Strategy depends upon a specific
weakness (repeating) and yet:
Unlimited access to training data
(common fault)
Strategy suggests how to segregate
characters
Learning complex strategies  perhaps
break other CAPTCHAs
Allan Caine 17
Future Directions
Apply the learn off-line/attack on-line
strategy to break other CAPTCHAs
(i.e. break yourtube.com and
audienceview.com)
Use analysis to build more robust
verifiers (i.e. k not constant)
Build prototype e-commerce
websites according to our model and
test.

Weitere ähnliche Inhalte

Ähnlich wie Security risks of using CAPTCHAs and potential attacks

Event-Based API Patterns and Practices
Event-Based API Patterns and PracticesEvent-Based API Patterns and Practices
Event-Based API Patterns and PracticesLaunchAny
 
Defending Google Brand Reputation and Analytics Reports
Defending Google Brand Reputation and Analytics ReportsDefending Google Brand Reputation and Analytics Reports
Defending Google Brand Reputation and Analytics ReportsAlycia Mitchell
 
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri
 
[Meetup] a successful migration from elastic search to clickhouse
[Meetup] a successful migration from elastic search to clickhouse[Meetup] a successful migration from elastic search to clickhouse
[Meetup] a successful migration from elastic search to clickhouseVianney FOUCAULT
 
AWS Activate Webinar - Growing on AWS
AWS Activate Webinar - Growing on AWSAWS Activate Webinar - Growing on AWS
AWS Activate Webinar - Growing on AWSAmazon Web Services
 
2018-05-16 Geeknight Dallas - Distributed Systems Talk
2018-05-16 Geeknight Dallas - Distributed Systems Talk2018-05-16 Geeknight Dallas - Distributed Systems Talk
2018-05-16 Geeknight Dallas - Distributed Systems TalkVishal Bardoloi
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
 
Eradicate Flaky Tests - AppiumConf 2021
Eradicate Flaky Tests - AppiumConf 2021Eradicate Flaky Tests - AppiumConf 2021
Eradicate Flaky Tests - AppiumConf 2021Anand Bagmar
 
Outsource Everything
Outsource EverythingOutsource Everything
Outsource EverythingYan Pritzker
 
Deep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 ArsenalDeep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 ArsenalIsao Takaesu
 
Realtime stream processing with kafka
Realtime stream processing with kafkaRealtime stream processing with kafka
Realtime stream processing with kafkaPraveen Singh Bora
 
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfBrute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfLior Rotkovitch
 
Getting all the 99.99(9) you always wanted
Getting all the 99.99(9) you always wanted Getting all the 99.99(9) you always wanted
Getting all the 99.99(9) you always wanted Mite Mitreski
 
Low Latency Fraud Detection & Prevention
Low Latency Fraud Detection & PreventionLow Latency Fraud Detection & Prevention
Low Latency Fraud Detection & PreventionSid Anand
 
Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...
Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...
Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...Databricks
 
Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1 Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1 Lior Rotkovitch
 
Mobile Single Sign-On (Gluecon '15)
Mobile Single Sign-On (Gluecon '15)Mobile Single Sign-On (Gluecon '15)
Mobile Single Sign-On (Gluecon '15)Brian Campbell
 
Setting up organization with api access
Setting up organization with api accessSetting up organization with api access
Setting up organization with api accesssivachandra mandalapu
 
SoftLayer API 12032015
SoftLayer API  12032015SoftLayer API  12032015
SoftLayer API 12032015Nacho Daza
 

Ähnlich wie Security risks of using CAPTCHAs and potential attacks (20)

Event-Based API Patterns and Practices
Event-Based API Patterns and PracticesEvent-Based API Patterns and Practices
Event-Based API Patterns and Practices
 
Defending Google Brand Reputation and Analytics Reports
Defending Google Brand Reputation and Analytics ReportsDefending Google Brand Reputation and Analytics Reports
Defending Google Brand Reputation and Analytics Reports
 
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
 
[Meetup] a successful migration from elastic search to clickhouse
[Meetup] a successful migration from elastic search to clickhouse[Meetup] a successful migration from elastic search to clickhouse
[Meetup] a successful migration from elastic search to clickhouse
 
AWS Activate Webinar - Growing on AWS
AWS Activate Webinar - Growing on AWSAWS Activate Webinar - Growing on AWS
AWS Activate Webinar - Growing on AWS
 
2018-05-16 Geeknight Dallas - Distributed Systems Talk
2018-05-16 Geeknight Dallas - Distributed Systems Talk2018-05-16 Geeknight Dallas - Distributed Systems Talk
2018-05-16 Geeknight Dallas - Distributed Systems Talk
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Eradicate Flaky Tests - AppiumConf 2021
Eradicate Flaky Tests - AppiumConf 2021Eradicate Flaky Tests - AppiumConf 2021
Eradicate Flaky Tests - AppiumConf 2021
 
Outsource Everything
Outsource EverythingOutsource Everything
Outsource Everything
 
Deep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 ArsenalDeep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 Arsenal
 
Realtime stream processing with kafka
Realtime stream processing with kafkaRealtime stream processing with kafka
Realtime stream processing with kafka
 
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfBrute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
 
Getting all the 99.99(9) you always wanted
Getting all the 99.99(9) you always wanted Getting all the 99.99(9) you always wanted
Getting all the 99.99(9) you always wanted
 
Low Latency Fraud Detection & Prevention
Low Latency Fraud Detection & PreventionLow Latency Fraud Detection & Prevention
Low Latency Fraud Detection & Prevention
 
Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...
Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...
Spark, GraphX, and Blockchains: Building a Behavioral Analytics Platform for ...
 
Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1 Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1
 
Mobile Single Sign-On (Gluecon '15)
Mobile Single Sign-On (Gluecon '15)Mobile Single Sign-On (Gluecon '15)
Mobile Single Sign-On (Gluecon '15)
 
Setting up organization with api access
Setting up organization with api accessSetting up organization with api access
Setting up organization with api access
 
The thieves
The thievesThe thieves
The thieves
 
SoftLayer API 12032015
SoftLayer API  12032015SoftLayer API  12032015
SoftLayer API 12032015
 

Security risks of using CAPTCHAs and potential attacks