1

I'm hacking together an amazon api and when only using python requests without proxying, it prompts for a captcha. When routing this python requests traffic through fiddler, it seems to pass without a problem. Is it possible that amazon is fingerprinting python requests and fiddler changes the fingerprint since it's a proxy?

I viewed headers sent from fiddler and python requests and they are the same.

There is no exra proxying/fiddler rules/filters set on fiddler to create a change.

To be clear, all mentioned proxying is only done locally, so it will not change the public ip address.

Thank you!

Zanga
  • 45
  • 1
  • 11
  • 1
    A way to find an answer to your question is to set up your own simple web server (in Python) and submit your request to it, both directly and through the proxy. You'll be able to see exactly how the request and its header are changed by routing it through the proxy and any of those changes *could* be used for fingerprinting. – Grismar Feb 26 '20 at 05:15
  • I kind of tried that, I used [link](https://stackoverflow.com/questions/10588644/how-can-i-see-the-entire-http-request-thats-being-sent-by-my-python-application) to get the headers/parameters sent but I'm starting to think it could be something on the tcp level, beyond my ability. – Zanga Feb 26 '20 at 05:22
  • 2
    You forget the HTTPS layer. By the supported SSL/TLS versions, the enabled ciphers, their order and other subtle differences in the TLS handshake (e.g. in the CLIENT_HELLO message) you can guess how the request was created. Use Wireshark to see the differences. – Robert Feb 26 '20 at 18:51
  • Thank you!! Changing the TLS version of python requests to TLSv1_2 fixed it! – Zanga Feb 27 '20 at 00:52

0 Answers0