Akamai
Akamai is renowned for its advanced anti-bot and anti-scraping solutions, widely adopted by major websites like Nike.com. The effectiveness of Akamai lies in its sophisticated approach that combines traditional fingerprinting techniques with behavioral analysis. This analysis involves tracking the JavaScript events that are triggered during a user’s interaction with the website.
Recognizing Akamai
To identify Akamai’s presence on a website, look for these characteristics:
- Endpoint Structure: Akamai typically operates without external servers, sending data to an endpoint on the website’s domain. These endpoints are characterized by long, random character paths that change with every new page load. Each endpoint typically ends with a seven-character string, comprising a mix of random lowercase and uppercase letters. Example from Nike.com:
- Sensor Data: Akamai sends a key JSON payload named sensor_data to these endpoints. This data is encoded or encrypted using a proprietary algorithm, making it distinct and recognizable. Example payload from Nike.com:
- Cookies: Akamai set the following cookies on the client browser:
Akamai’s Device Fingerprinting
Akamai extensively uses techniques like Canvas Fingerprinting and WebGL fingerprinting to identify user devices. This is achieved using JavaScript, as illustrated in the provided scripts. These scripts create a unique identifier for each device based on how it renders certain elements.
Akamai Behavioral Analysis
In its highest security settings, Akamai can capture multiple sensor_data payloads per minute. This includes recording various user interactions like mouse movements, clicks, touch events, and keyboard inputs. The system also tracks the positions of these events on the page.
Here is the event it is listening to:
touchmove
touchstart
touchend
touchcancel
mousemove
click
mousedown
mouseup
pointerdown
pointerup
keydown
keyup
keypress
touchmove
touchstart
touchend
touchcancel
onmousemove
onclick
onmousedown
onmouseup
onpointerdown
onpointerup
onkeydown
onkeyup
onkeypress
Bypassing Akamai
Bypassing Akamai’s security requires a nuanced approach, especially considering its reliance on GPU rendering information to determine the operating system and device type.
Here are some strategies:
- GPU Rendering: Emulate consumer-grade GPUs rather than professional hardware, as Akamai’s algorithms are tuned to recognize and differentiate between them.
- Behavioral Analysis: Utilize tools like ghost-cursor (found at https://npmjs.com/package/ghost-cursor) to simulate human-like cursor movements and keystrokes. Timing is crucial here; movements or keystrokes that are too rapid can be flagged as suspicious.