web scrapers have gotten really good at working around passive countermeasures such as captchas, ip blocking and rate limiting
i have yet to see any scraper able to deal with decompression bombs, however
it's time to be downright hostile to companies and techbros' bullshit if you ask me
https://git.arielaw.ar/arisunz/ir34
Edit: if you can't (or don't want to) host your own instance, you can use mine at boom [dot] arielaw [dot] ar
@arisunz I really enjoy hearing ideas for offensive defense :)
Like when I used to have nmap scans and metasploit kick off against a machine that attempted a port scan :D
@arisunz the name of your software is genius. I am in awe. You win so much. đ
@arisunz evil technique i learned from @sasha
location /wp-login.php {
return 301 "http://speed.hetzner.de/10GB.bin";
}
@arisunz Seriously? Not handling the equivalent of zip bombs in >2020?
@0x2ba22e11 people say naming stuff is one of the hardest things in computer science
I say we just need to up our shitposting levels a bit
@Dracodare (oh, you caught a typo, thanks!)
A decompression* bomb is basically a seemingly small compressed file, such as a zip or gz, that grows to a ridiculously big size when you try to decompress it. A common example is a 10Mb zip file decompressing to a 10 Gb one. Trying to decompress these files crashes the process doing so at best, and brings a system to its knees at worst.
@arisunz >to read more about this technique, google âinflation rule 34â.
@arisunz
Omg, I love it!
I use this to serve and endless hellscape to unruly bots: https://github.com/yunginnanet/HellPot
@arisunz would this fuck up things like the wayback machine? does it matter?
@anova that's exactly what this is for though! bots that get to this service and ignore robots.txt get a decompression bomb for lunch
@arisunz
to read more about this technique, google "inflation rule 34".
>:|
@jet it might, not sure if they're honoring robots.txt (they fucking should)
@arisunz yeah now I think about it Iâm sure they do, so itâs a bit moot. I just work daily with people who are doing web scraping for imo good reasons so had a knee jerk moment.
@oreolek @arisunz @sasha if they check the redirect target you can also use https://opensource.zalando.com/skipper/reference/filters/#wrapcontenthex to create a gzip bomb that saves your bandwidth and likely will explode when their http client automatically decompress the âcontentâ.