-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[kemonoparty] DDoS Guard bypass #1779
Comments
Setting gallery-dl/gallery_dl/extractor/common.py Lines 342 to 345 in 1f02878
Say, is this service reliable enough to actually block real DDoS attacks when its check can be tricked that easily, at least by single, individual users? |
Should be. The actual DDoS detection happens on a different layer than the browser check, and has stopped major attacks on the site before. As to why the browser check exists at all then... ¯\_(ツ)_/¯ |
Just a few notes I have from some testing/reverse engineering, hopefully this helps gallery-dl work a bit better with Kemono.
__ddg2
appears to be the only cookie that matters. DDoS-Guard will set__ddg1
in the response if it was absent from the request, but will not trigger the check screen if it isn't there.__ddg2
cookie can be retrieved from this endpoint;https://check.ddos-guard.net/check.js
. An example in Python is shown below;__ddg2
can be set to any random value without any issues? I've tried this, and any text works consistently to get past the check screen with no issues, as long as the cookie is there.The text was updated successfully, but these errors were encountered: