fix estimated read time

This commit is contained in:
JamesFlare1212
2024-04-17 14:29:44 -04:00
parent 3b991a8135
commit a100b6794e
4 changed files with 16 additions and 8 deletions

View File

@@ -181,6 +181,10 @@ Okay, let me give you another bad idea. Since we don't need a very large request
We can use this modified Selenium Chromedriver to bypass CloudFlare's verification code, UA, browser fingerprint, and other detection methods.
Or even more advanced, without webdriver, without selenium, it's even harder to detect.
[![undetected_chromedriver Git Card](https://github-readme-stats.jamesflare.com/api/pin/?username=ultrafunkamsterdam&repo=nodriver&theme=github_dark_dimmed&show_owner=false)](https://github.com/ultrafunkamsterdam/nodriver)
Then find a more dynamic point, such as entering random content in the search box to search. Coupled with our IPv6 human wave tactics, just a few dozen RPS can lead to a performance crisis for them. So many Selenium Chromedrivers may indeed consume some performance, but it's not very difficult to run on your own laptop. But from the Blue Team's perspective, it's a headache. They will see an extremely normal scene, with different IP addresses having a user accessing only once every half hour, an hour, or even a few hours. Or some IP addresses may not even access a second time. Will you wonder if your website has gone viral somewhere, rather than being attacked?
## Summary

View File

@@ -181,6 +181,10 @@ flowchart TD
我们可以用这个改进的Selenium Chromedriver绕过CloudFlare的验证码UA浏览器指纹等检测方式。
或者更先进一点的没有webdriver也没有selenium更加难以检测。
[![undetected_chromedriver Git Card](https://github-readme-stats.jamesflare.com/api/pin/?username=ultrafunkamsterdam&repo=nodriver&theme=github_dark_dimmed&show_owner=false)](https://github.com/ultrafunkamsterdam/nodriver)
然后找一个动态点比如去搜索框输入随机内容搜索。再配合我们的IPv6人海战术只需要几十rqs就可以导致它的性能危机。这么多Selenium Chromedriver可能确实会有些消耗性能但是在自己笔记本上运行也不是很有难度。但是在Blue Team看来就头大了。他们会看见无比正常的一幕不同的IP地址有一个用户每半个小时一个小时甚至几个小时才访问一次。或者有一些IP地址的用户甚至不会访问第二次你会不会疑惑自己的网站是不是发到哪里火了而不是被攻击了。
## 总结