Cатсн²² (in)sесuяitу / ChrisJohnRiley

Because we're damned if we do, and we're damned if we don't!

[PoC] scr.im-jim

Back in October 2009 I wrote a technical review of the http://scr.im service (a captcha protection for email addresses). I pointed out some issues with the way they use captchas, as well as some technical issues with the way the site functioned. At the time I didn’t think it was worth putting out a Proof of Concept tool to exploit the site, but after the issue was brought up again on Twitter a year later, I decided to write a quick Python script to extract email addresses from scr.im directly using some of these flaws.

A friend of mine has also written a Selenium script to do the same (script | video)

So, I proudly present scr.im-jim (a play on the slim-jim tool used to break into cars without keys). It’s not the prettiest code ever, but as with everything, I learnt something from writing the tool, so for that it makes it worthwhile.

The Python script uses BeautifulSoup (easy_install beautifulsoup).


 Pass a single userID variable to the script and allow it to crack the captcha used by scr.im.

 -i / --id= scr.im ID to be checked
 -v verbose output


 ./scr.im-jim.py -i 12345
 ./scr.im-jim.py --id=12345

A video of the tool in action (short and sweet) can be seen below (direct link)

The video is bet viewed in HD quality, you can click through on the video above, or use the shortcut below to directly access it on the Vimeo site.

Warning: This may be against the Terms of Service for scr.im, use at your own risk! This is a Proof of Concept to show a vulnerability, not an attack tool!


One response to “[PoC] scr.im-jim

  1. Pingback: scr.im revisited | Cатсн²² (in)sесuяitу

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: