Skip to content

Instantly share code, notes, and snippets.

View tylercunnion's full-sized avatar

Tyler Cunnion tylercunnion

View GitHub Profile
@Glyxbaer
Glyxbaer / gist:4564489
Last active April 9, 2017 17:24
Why Minteye was meant to be cracked

#Why Minteye was meant to be cracked ##inventing CAPTCHAs without skill

Some days ago I read a post by Samuirai about him cracking the minteye CAPTCHA (cracking minteye captcha without skill) with the google speech2text api and two days later it was covered on Hack a day. For me, it was a really straightforward approach to crack such a CAPTCHA and it was something nobody really noticed or pointed out before. It also shows how little the developers have thought about the real usefulness and security behind their idea.

-----> Heroku receiving push
-----> Removing .DS_Store files
-----> Ruby/Rails app detected
/usr/local/lib/ruby/1.9.1/fileutils.rb:243:in `mkdir': Permission denied - /mnt/slug-compiler/language_packs/ruby/vendor (Errno::EACCES)
from /usr/local/lib/ruby/1.9.1/fileutils.rb:243:in `fu_mkdir'
from /usr/local/lib/ruby/1.9.1/fileutils.rb:217:in `block (2 levels) in mkdir_p'
from /usr/local/lib/ruby/1.9.1/fileutils.rb:215:in `reverse_each'
from /usr/local/lib/ruby/1.9.1/fileutils.rb:215:in `block in mkdir_p'
from /usr/local/lib/ruby/1.9.1/fileutils.rb:201:in `each'
from /usr/local/lib/ruby/1.9.1/fileutils.rb:201:in `mkdir_p'