# Bypass Captcha

## Methods

{% embed url="<https://sallam.gitbook.io/sec-88/web-appsec/features-abuse/captcha>" %}

{% embed url="<https://github.com/Mehdi0x90/Web_Hacking/blob/main/Captcha%20Bypass.md>" %}

{% embed url="<https://github.com/tuhin1729/Bug-Bounty-Methodology/blob/main/Captcha.md>" %}

{% embed url="<https://github.com/trilokdhaked/Bug-Bounty-Methodology/blob/main/Bypass/Bypass%20Captcha.md>" %}

{% embed url="<https://securitycipher.com/docs/security/penetration-testing-tricks/captcha-bypass/>" %}

1 - Try changing the request method, for example

```
POST / HTTP 1.1 
Host: http://target.com
 ... 
 _RequestVerificationToken=xxxxxxxxxxxxxx&_Username=daffa&_Password=test123 
```

&#x20;POST to GET  - Change the method to GET&#x20;

```
GET /?_RequestVerificationToken=xxxxxxxxxxxxxx&_Username=daffa&_Password=test123 HTTP 1.1 
Host: http://target.com
 ... 
```

2 - Try remove the value of the captcha parameter&#x20;

```
POST / HTTP 1.1 
Host: http://target.com
 ... 
 _RequestVerificationToken=&_Username=daffa&_Password=test123 
```

3 - Try reuse old captcha token&#x20;

```
POST / HTTP 1.1 
Host: http://target.com
 ... 
 _RequestVerificationToken=OLD_CAPTCHA_TOKEN&_Username=daffa&_Password=test123 
```

4 - Convert JSON data to normal request parameter&#x20;

```
POST / HTTP 1.1 
Host: http://target.com
 ... 
{"_RequestVerificationToken":"xxxxxxxxxxxxxx","_Username":"daffa","_Password":"test123"}
```

&#x20;Convert to normal request

```
 POST / HTTP 1.1 
 Host: http://target.com
 ... 
 _RequestVerificationToken=xxxxxxxxxxxxxx&_Username=daffa&_Password=test123 
```

5 - Try custom header to bypass captcha &#x20;

```
X-Originating-IP: 127.0.0.1 
X-Forwarded-For: 127.0.0.1 
X-Remote-IP: 127.0.0.1 
X-Remote-Addr: 127.0.0.1
```

6 - Change some specific characters of the captcha parameter and see if it is possible to bypass the restriction.&#x20;

```
POST / HTTP 1.1 
Host: http://target.com
 ... 
_RequestVerificationToken=xxxxxxxxxxxxxx&_Username=daffa&_Password=test123
```

Try this to bypass&#x20;

```
POST / HTTP 1.1 
Host: http://target.com
 ... 
 _RequestVerificationToken=xxxdxxxaxxcxxx&_Username=daffa&_Password=test123
```

## Google Recaptcha

{% embed url="<https://github.com/sarperavci/GoogleRecaptchaBypass>" %}

## [Earn Free Crypto / BTC with Cointiply](https://cointiply.com/r/pkZxp)

[**Play Games Earn Cash Rewards**](https://cointiply.com/r/pkZxp)

<figure><img src="https://4199783661-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MFF3hT6DtJlHn9jAel9%2Fuploads%2FtT3srZzbUxV8iN6zjNrl%2Fimage.png?alt=media&#x26;token=962e4759-e8b9-4e26-b998-6df524fdfaf8" alt=""><figcaption></figcaption></figure>

## Interesting Books

{% content-ref url="../../interesting-books" %}
[interesting-books](https://0xss0rz.gitbook.io/0xss0rz/interesting-books)
{% endcontent-ref %}

{% hint style="info" %}
**Disclaimer**: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.
{% endhint %}

* [**The Web Application Hacker’s Handbook**](https://www.amazon.fr/dp/1118026470?tag=0xss0rz-21) The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
* [**Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities**](https://www.amazon.fr/dp/1718501544?tag=0xss0rz-21) Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
* [**Real-World Bug Hunting: A Field Guide to Web Hacking**](https://www.amazon.fr/dp/1593278616?tag=0xss0rz-21) Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://0xss0rz.gitbook.io/0xss0rz/pentest/web-attacks/bypass-captcha.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
