Berkeley CSUA MOTD:Entry 50801
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2008/8/6-10 [Computer/SW/Security] UID:50801 Activity:nil
8/6     What kind of captcha would you love to see? List them here:
        -Hot or not?  TOTALLY
        -Male or Female?
        -Gay or not?
        -Geek or not?
        -enormous breasts or regular size breasts?
        \_ Chinese, Japanese or Korean?
           \_ That would also serve as a test to weed out whites.
                \_ Oh come one.  It's been demonstrated that Asians can't
                   tell each other apart either.
        \_ What's "captcha"?  Thx.
           \_ STFW.  Or just read http://en.wikipedia.org/wiki/Captcha
              \_ I see.  But then what does hot or female or gay above have
                 to do with Captcha?
                 \_ Hard to program something to automate that check. It used
                    to be impossible to write a program to recognize the
                    distorted letters and numbers used in older Captcha's, but
                    technology has caught up.
        \_ http://www.badhackerz.com/full-appz/11087-rapidshare-turbo-download-reads-new-cat-captchas.html
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
Cache (7984 bytes)
en.wikipedia.org/wiki/Captcha
server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. Turing test that is typically administered by a human and targeted to a machine. A common type of CAPTCHA requires that the user type the letters or digits of a distorted image that appears on the screen. edit Characteristics A CAPTCHA system is a means of automatically generating new challenges which: * Current software is unable to solve accurately. Although a checkbox "check here if you are not a bot" might serve to distinguish between humans and computers, it is not a CAPTCHA because it relies on the fact that an attacker has not spent effort to break that specific form. The most important factor in deciding whether an algorithm should be made open or restricted is the size of the system. Although an algorithm which survives scrutiny by security experts may be assumed to be more conceptually secure than an unevaluated algorithm, an unevaluated algorithm specific to a very limited set of systems is always of less interest to those engaging in automated abuse. Breaking a CAPTCHA generally requires some effort specific to that particular CAPTCHA implementation, and an abuser may decide that the benefit granted by automated bypass is negated by the effort required to engage in abuse of that system in the first place. edit Applications CAPTCHAs are used to prevent automated software from performing actions which degrade the quality of service of a given system, whether due to abuse or resource expenditure. CAPTCHAs also serve an important function in rate limiting, as automated usage of a service might be desirable until such usage is done in excess, and to the detriment of human users. In such a case, a CAPTCHA can enforce automated usage policies as set by the administrator when certain usage metrics exceed a given threshold. Web accessibility Because CAPTCHAs rely on visual perception, users unable to view a CAPTCHA (for example, due to a disability or because it is difficult to read) will be unable to perform the task protected by a CAPTCHA. As such, sites implementing CAPTCHAs may provide an audio version of the CAPTCHA in addition to the visual method. The official CAPTCHA site recommends providing an audio CAPTCHA for accessibility reasons. edit Attempts at more accessible CAPTCHAs Even an audio and visual CAPTCHA will require manual intervention for some users, such as those who are both deaf and blind. There have been various attempts at creating CAPTCHAs that are more accessible. mathematical questions ("what is 1+1" or even more complex problems like derivatives or polynomial factorization -- also known as a MAPTCHA, or Mathematical CAPTCHA), or "common sense" questions ("what color is the sky"). These attempts violate one or both of the principles of CAPTCHAs: either they cannot be automatically generated or they can be easily cracked given the state of artificial intelligence. an attacker is unlikely to have encountered the formulation of the CAPTCHA in question, and unlikely to find it worth the time spending resources to break the CAPTCHA of a small site. Due to the lack of security provided by text based CAPTCHAs, most sites choose to use an audio and visual CAPTCHA as a way of balancing accessibility and security. Often, email or telephone support is used to manually provide access to users who are unable to solve a CAPTCHA. edit Insecure implementation Like any security system, design flaws in a system implementation can prevent the theoretical security from being realized. Many CAPTCHA implementations, especially those which have not been designed and reviewed by experts in the fields of security, are prone to common attacks. HMAC Finally, some implementations use only a small fixed pool of CAPTCHA images. Eventually, when enough CAPTCHA image solutions have been collected by an attacker over a period of time, the CAPTCHA can be broken by simply looking up solutions in a table, based on a hash of the challenge image. The only step where humans still outperform computers is segmentation. If the background clutter consists of shapes similar to letter shapes, and the letters are connected by this clutter, the segmentation becomes nearly impossible with current software. Hence, an effective CAPTCHA should focus on the segmentation. One approach involves relaying the puzzles to a group of human operators who can solve CAPTCHAs. In this scheme, a computer fills out a form and when it reaches a CAPTCHA, it gives the CAPTCHA to the human operator to solve. Another variation of this technique involves copying the CAPTCHA images and using them as CAPTCHAs for a high-traffic site owned by the attacker. edit Image-recognition CAPTCHAs Some researchers promote image recognition CAPTCHAs as a possible alternative for text based CAPTCHAs. To date, no major website has made use of an image based CAPTCHA. which in its default form presents a question requiring the user to select a stated type of animal from an array of thumbnail images of assorted animals. The images (and the challenge questions) can be customized, for example to present questions and images which would be easily answered by the forum's target userbase. This was later removed because users had trouble entering the correct letters. Image recognition CAPTCHAs face many potential problems which have not been fully studied. It is difficult for a small site to acquire a large dictionary of images which an attacker does not have access to and without a means of automatically acquiring new labelled images, an image based challenge does not meet the definition of a CAPTCHA. Human solvers are a potential weakness for strategies such as Asirra. Photos that are subsequently added to the Asirra database are then a relatively small data set that can be classified as they first appear. Another potential weakness is that only a yes/no answer for each picture is required by most designs. Even with sixteen images, a bot has a 1 in 65536 (2^16) chance of getting the captcha right purely by chance. Furthermore, such chance identifications can be used to accumulate knowledge about the correct identification of the images, allowing the bot to progressively improve the accuracy of its guesses over time. botnet attacks, the user would need to be forced to solve an annoyingly large number of images. The image database is not downloadable as it includes images of already adopted pets, which is 10 times the size of pets for adoption. Bot guessing is solved by creating both IP and session based buckets -- once IP has misclassified a challenge, a human needs to just solve two Asirras in a row from the same browser session reducing brute force probability to 1 in less than 5 million. The user will be asked to type the alphanumeric character that overlies a particular feature. This process can automatically generate an effectively infinite number of image-recognition CAPTCHA. computer vision program that can recognize the objects within the 3-D CAPTCHA images is intrinsically difficult. In addition, a compromised object will be automatically identified by the sudden influx of responses that correctly name the compromised object while incorrectly naming the other objects. The instructions that accompany the 3-D CAPTCHA image are bound by language dependency. Any entity deploying the 3-D CAPTCHA will need to select the language to be used for the instructions that will accompany the image. edit Collateral benefits Some of the original inventors of the CAPTCHA system have implemented a means by which some of the effort and time spent by people who are responding challenges can be harnessed as a distributed work system. "Spammers' bot cracks Microsoft's CAPTCHA: Bot beats Windows Live Mail's registration test 30% to 35% of the time, says Websense", Computerworld"', February 7, 2008 21.
Cache (3673 bytes)
www.badhackerz.com/full-appz/11087-rapidshare-turbo-download-reads-new-cat-captchas.html
Mark Forums Read Notices Welcome to the BadHackerz forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. The CAPTCHAs are displayed as up to 8 warped alphanumeric characters, each with a dog or a cat printed over them. The user then is instructed to type in the 4 letters (although technically some letters are actually numbers) with the cat on them. OCR Rapidshare CAPTCHA cats As you can see that it is tough to us humans for recognize which characters has cats at the sample RapidShare CAPTCHA image above! This new update has gone a little too far just because they want to break CryptLoad, USDownloader, lephant and RSD auto CAPTCHA decryption. All those tools were unable to auto recognized RapidShare CAPTCHA codes for more than a month but now CryptLoad has managed to find a way to decode and auto recognize RapidShare CAPTCHA with cats! Unlimited RapidShare downloading is AGAIN possible with CryptLoad. On 17 April 2008, RapidShare has again updated their CAPTCHA system and brought back the happy hours. The new CAPTCHA code now contains more than 4 characters and it ask you to enter all letters having a cat. If you look carefully, you will find all the animals are not Cats. Some are Dogs which is very similar looking and confuses people. Sometimes even I have problems identifying which is cat and which is dog and can only get it right after a few tries. Rapidshare CATS letters Next, You will get a message that says The RapidShare Happy Hours are active right now. Their happy hours means that the download ticket waiting time and CAPTCHA will be totally disabled. However, after youve finished downloading a file, you will still need to wait for X amount of minutes before you can download the next file from RapidShare happy hours They don't have a specific time when the happy hours will start or end. RapidShare only mentioned that when their servers have enough spare bandwidth, they will make it easier for free users to download from RapidShare. These updates are meant to break all those third party tools (Cryptload, lephant, RSD, USDownloader) that can download from RapidShare as a free user as if they were a premium user. rar IF YOU LIKE MY WORK ADD To view links or images in signatures your post count must be 10 or greater. IT DOESNT MEAN ALOT TO YOU IT DOES TO ME Every Thing Posted By Me Is For Educational Purposes Only. I Shall Not Be Held Responsible For Misuse Or Theft Of Services And Products. To view links or images in signatures your post count must be 10 or greater. To view links or images in signatures your post count must be 10 or greater. To view links or images in signatures your post count must be 10 or greater. To view links or images in signatures your post count must be 10 or greater. To view links or images in signatures your post count must be 10 or greater. To view links or images in signatures your post count must be 10 or greater. IF YOU LIKE MY POSTS OR YOU ARE JUST FEELING KIND To view links or images in signatures your post count must be 10 or greater. ADD TO MY REP+ To view links or images in signatures your post count must be 10 or greater. IF YOU LIKE MY WORK ADD To view links or images in signatures your post count must be 10 or greater. IT DOESNT MEAN ALOT TO YOU IT DOES TO ME Every Thing Posted By Me Is For Educational Purposes Only. I Shall Not Be Held Responsible For Misuse Or Theft Of Services And Products.