go-rod / stealth

anti-bot-detection with rod
https://pkg.go.dev/github.com/go-rod/stealth
MIT License
252 stars 33 forks source link

Questions: Cloudflare Waiting Room #22

Open ManuCiao10 opened 2 years ago

ManuCiao10 commented 2 years ago

hello, I'm trying to bypass cloudflare with your example_file but i'm not finding any documentation to wait until the pages is fully loaded. As for example on aw-lab.com you have to wait like 5-6 seconds before been redirect in the home page. I tried to use page.Timeout(10 * time.Second).MustWaitLoad() but it didnt wait 10 seconds

ysmood commented 2 years ago

I think you misunderstand how timeout and context work in golang. Please check https://go-rod.github.io/#/context-and-timeout

IndiaTransform commented 1 year ago

For VFS VISA Poland Belarus Cloudflare Waiting Room Bypass

Django & Node JS will do the Trick.

I have worked on Multiple Assignments related VFS POLAND VISA BOT DEVELOPMENT

VFS PORTUGAL VISA BOT DEVELOPMENT

VFS VISA CROATIA BOT DEVELOPMENT

All of them have Waiting Room Bypass Code along with Auto Appointment Check, Multiple File Submission, VFS VISA OTP READER, VFS Auto Payment.

In case you want to learn about it, Or have any Question for me.

Feel Free to Contact me via this Section, Feel Free to Direct Call / WhatsApp +91 9643 644 684

Sharan Khanna https://indiatransform.com/

My Youtube Channel - https://www.youtube.com/@sharankhanna6051

ManuCiao10 commented 1 year ago

hey @ysmood, I test stealth with https://gitlab.com/users/sign_in with the following code:

func GetCloudFlareClearanceCookie(client *http.Client, target string) error {
    browser := rod.New().Timeout(time.Minute).MustConnect()
    defer browser.MustClose()

    // You can also use stealth.JS directly without rod
    fmt.Printf("js: %x\n", md5.Sum([]byte(stealth.JS)))

    page := stealth.MustPage(browser)

    page.MustNavigate("https://gitlab.com/users/sign_in")

    time.Sleep(8 * time.Second) // giving a few secs for the challenge
    page.MustScreenshot("")

    log.Println("[*] Fetching Cloudflare clearance cookie...")

As result looks like the page is not going forward to the request and can't bypass cloudflare.

1684231817609401000

Same with https://nowsecure.nl

ysmood commented 1 year ago

https://github.com/go-rod/rod/issues/744

ManuCiao10 commented 1 year ago

hey, thanks for the answer, i will give a try right now.

ysmood commented 1 year ago

https://developer.chrome.com/articles/new-headless/

ManuCiao10 commented 1 year ago

just did a test with the code reported here https://github.com/go-rod/rod/issues/744 And even this time is looping without solving the challenge. I don't know if it due the new Cloudflare Turnstile captcha.

nowsecure

kaizenlabs commented 2 months ago

Same here. When you need to click to Verify how can you do that?