Defeating Google's audio reCaptcha with 85% accuracy.
Switch branches/tags
Nothing to show
Clone or download
dpatel19 Update README.md
We are no longer maintaining this code.
Latest commit 60712ab Jan 27, 2018
Permalink
Failed to load latest commit information.
final Delete part2 Oct 24, 2017
.gitignore Add ignore rule for audio.pyc Oct 29, 2017
LICENSE Initial commit Sep 27, 2017
README.md Update README.md Jan 27, 2018
audio.py Fixed spaces Oct 20, 2017
main.py Added final line in main Oct 20, 2017
mfcc_solver.py cleanup Oct 20, 2017
requirements.txt Add more dependencies Oct 29, 2017
ris.py Added ris Oct 27, 2017
thesaurus.py Added ris Oct 27, 2017

README.md

uncaptcha

Defeating Google's audio reCaptcha system with 85% accuracy. uncaptcha

Disclaimer

unCaptcha is intended to be a proof of concept. As of the time of our paper, we found it to successfully solve reCaptcha's audio challenges with 85% success. Since that time, reCaptcha appears to include some additional protections that limit unCaptcha's success. We will not be maintaining this code to be an effective attack on reCaptcha.

For instance, Google has also improved their browser automation detection. This means that Selenium cannot be used in its current state to get captchas from Google. This may lead to Google sending odd audio segments back to the end user. Additionally, we have observed that some audio challenges include not only digits, but small snippets of spoken text.

We encourage you to be careful when doing research in this field, to be mindful of local, state, and federal law, and to responsibly disclose any potential vulnerabilities to Google immediately.

Additionally, we have removed our API keys from all the necessary queries. If you are looking to recreate some of the work or are doing your own research in this area, you will need to acquire API keys from each of the six services used. These keys are delineated in our files by a long string of the character 'X'.

Inspiration

Across the Internet, hundreds of thousands of sites rely on Google's reCaptcha system for defense against bots (in fact, Devpost uses reCaptcha when creating a new account). After a Google research team demonstrated a near complete defeat of the text reCaptcha in 2012, the reCaptcha system evolved to rely on audio and image challenges, historically more difficult challenges for automated systems to solve. Google has continually iterated on its design, releasing a newer and more powerful version as recently as just this year. Successfully demonstrating a defeat of this captcha system spells significant vulnerability for hundreds of thousands of popular sites.

What it does

Our unCaptcha system has attack capabilities written for the audio captcha. Using browser automation software, we can interact with the target website and engage with the captcha, parsing out the necessary elements to begin the attack. We rely primarily on the audio captcha attack - by properly identifying spoken numbers, we can pass the reCaptcha programmatically and fool the site into thinking our bot is a human. Specifically, unCaptcha targets the popular site Reddit by going through the motions of creating a new user, although unCaptcha stops before creating the user to mitigate the impact on Reddit.

Background

Google's reCaptcha system uses an advanced risk analysis system to determine programmatically how likely a given user is to be a human or a bot. It takes into account your cookies (and by extension, your interaction with other Google services), the speed at which challenges are solved, mouse movements, and (obviously) how successfully you solve the given task. As the system gets increasingly suspicious, it delivers increasingly difficult challenges, and requires the user to solve more of them. Researchers have already identified minor weaknesses with the reCaptcha system - 9 days of legitimate (ish) interaction with Google's services is usually enough to lower the system's suspicion level significantly.

How it works

The format of the audio captcha is a varied-length series of numbers spaced out read aloud at varied speeds, pitches, and accents through background noise. To attack this captcha, the audio payload is identified on the page, downloaded, and automatically split by locations of speech.

From there, each number audio bit is uploaded to 6 different free, online audio transcription services (IBM, Google Cloud, Google Speech Recognition, Sphinx, Wit-AI, Bing Speech Recognition), and these results are collected. We ensemble the results from each of these to probabilistically enumerate the most likely string of numbers with a predetermined heuristic. These numbers are then organically typed into the captcha, and the captcha is completed. From testing, we have seen 92%+ accuracy in individual number identification, and 85%+ accuracy in defeating the audio captcha in its entirety.

Installation

First, install python dependencies:

$ pip install -r requirements.txt

Make sure you also have sox, ffmpeg, and selenium installed!

$ apt-get install sox ffmpeg selenium

Then, to kick off the PoC:

$ python main.py --audio --reddit

This opens reddit.com, interacts with the page to go to account signup, generates a fake username, email, password, and then attacks the audio captcha. Once the captcha is completed (whether it passed or not), the browser exits.

To learn more

Please read our paper, located here, for more information. Additionally, you can visit our website here, or check out the original Slides for USENIX WOOT '17.

Example

Watch the video

Slides for USENIX WOOT '17

Contributors

Kkevsterrr

dpatel19

ecthros

Dave Levin