Menu

Bypass Amazon WAF

There are 2 options how this captcha is used at destination pages:

1. Bots filtering page which Amazon shows automatically when you visit a website behind their firewall. We call it "gokuProps", because you can find window.gokuProps parameters at this page source code.

2. Standalone captcha widget which is triggered by user's action. We call it Widget.

Identify the type of captcha yourself and use switcher below to show different version of the documentation and examples.

gokuProps
Widget

Use this type of tasks to obtain Amazon WAF cookie token. Simply grab temporary iv and context tokens along with permanent key site key, send them to our API. Result of the task is a token which you can use in your HTTP request as a cookie value with name amazon-waf-token.

Test this type of task first for bypass rate before testing tasks with proxies.

Amazon WAF captcha exampleAmazon WAF widget captcha example
Captcha example

Task object

PropertyTypeRequiredPurpose
typeStringYesAmazonTaskProxyless
websiteURLStringYesAddress of a target web page. Can be located anywhere on the web site, even in a member area. Our workers don't navigate there but simulate the visit instead.
websiteKeyStringYesValue of key from window.gokuProps object in WAF page source code.
ivStringYesValue of iv from window.gokuProps object in WAF page source code.
contextStringYesValue of context from window.gokuProps object in WAF page source code.
captchaScriptStringNoOptional URL leading to captcha.js
challengeScriptStringNoOptional URL leading to challenge.js
gokuProps
Widget

Request example

Python
Javascript
Go
PHP
Java
C#
bash
#pip3 install anticaptchaofficial

from anticaptchaofficial.amazonproxyless import *

solver = amazonProxyless()
solver.set_verbose(1)
solver.set_key("YOUR_API_KEY")
solver.set_website_url("https://website.com")
solver.set_website_key("key_value_from_window.gokuProps_object")
solver.set_iv("iv_value_from_window.gokuProps_object")
solver.set_context("context_value_from_window.gokuProps_object")

# Optional script URLs
solver.set_captcha_script("https://e9b10f157f38.9a96e8b4.us-gov-west-1.captcha.awswaf.com/e9b10f157f38/76cbcde1c834/2a564e323e7b/captcha.js")
solver.set_challenge_script("https://e9b10f157f38.9a96e8b4.us-gov-west-1.token.awswaf.com/e9b10f157f38/76cbcde1c834/2a564e323e7b/challenge.js")

# Specify softId to earn 10% commission with your app.
# Get your softId here: https://anti-captcha.com/clients/tools/devcenter
solver.set_soft_id(0)

token = solver.solve_and_return_solution()
if token != 0:
    print "token: "+token
else:
    print "task finished with error "+solver.error_code

Task solution object

PropertyTypePurpose
tokenStringUse this token as a cookie value with name "aws-waf-token" in your request to the target web page.

Response example

{
    "errorId":0,
    "status":"ready",
    "solution": {
      "token": "fe4c2ff3-6ed6-40fa-95c9-4c738a7dad49:FgoAe0ZLBmYBAAAA:LK0S/m1nGbfjDk/9i6tMmiUWGecMfyjvuAx9lY6ZhaBUmjrILEqW00UAsEliykPjwebdzn9J3..."
    },
    "cost":"0.002000",
    "ip":"46.98.54.221",
    "createTime":1472205564,
    "endTime":1472205570,
    "solveCount":"0"
}