Crawlio’s Post

View organization page for Crawlio, graphic

30 followers

How to bypass Kasada anti-bot system?? Kasada seems to be one of the most aggressive systems. To the point where it seems counter-productive. It is so aggressive that it blocks legitimate traffic such as: * Some search engine bots * Some unpopular distro/browser combos. Example: I tried deploying a minimal ubuntu container on my k3s server, installed Chromium, tried to visit a Kasada protected website and surprise suprise... I was blocked. No puppeteer, no debugging-port enabled, no mumbo-jumbo, just "chromium" in the command line. * Running a browser with "sudo". Yep... you heard me right... Try running chromium with sudo on a Mac and see for yourself... On the other hand it seems Kasada is pretty ignorant about a lot other stuff that other systems such as DataDome immediately catch. It really seems they have their focus on completely wrong things. Anyways... you are here to know how to bypass it, right? Let's get to it. Ehm... it's simple really. At least on a Mac. Launch chromium from the command line, not through puppeteer library. Then use connect in puppeteer and it will scrape just fine. Yep... even without puppeteer-extra-stealth-plugin. P.S. I haven't tried the same on Windows. You mileage may vary and this vulnerability might soon be patched, but as of today - it works. Pretty obvious and easy workaround right? Yep... Follow for more tips. #scraping #crawling #crawlio #kasada

To view or add a comment, sign in

Explore topics