Open dpopes opened 2 years ago
I found some slightly obfuscated/minified javascript (https://d3op16id4dloxg.cloudfront.net/RelevantID4.js) that's being served on their site (pretty formatting => https://pastebin.com/GgXUMCKu) that may yield some clues
You are using windows platform name (Win32) for a Mac useragent. You should use the parameters carefully no matter how powerful the tool is in bypassing detection.
You could try https://github.com/kaliiiiiiiiii/Selenium-Profiles or undetected-chromedriver
I have not been able to figure out how they're doing it, but using a selenium chromedriver with
sealth
, I still see:This is running from my laptop on a residential IP address. Even if I just launch chromedriver and then manually interact with the login form and log in, I still get the "unusual browser" modal dialog.
Any thoughts on what might be going on here?