This is a proof-of-concept (PoC) script designed to bypass SiteGround's AI-powered antibot protection. The script utilizes Selenium WebDriver and Python's requests library to automate a browser session on Firefox.
Siteground triggers the Antibot process when:
- The IP address is reported.
- The IP address makes extensive interactions with the endpoint.
After performing some reverse-engineering, I observed that Siteground's antibot detection mechanism creates a cookie with the following format:
_I_: 89d4b4400b603ce9ee6e1afecdbc09488b45aae90cbdcb5f9b63a5437fd8881c-1747298858
The cookie's value is generated using the User Agent information extracted from the request being checked.
Once the _I_ value has been established, Siteground's Antibot Detection does not further evaluate the subsequent request behavior.
The cookie can be used for at least 12 hours.
To use this script, you'll need to have the following prerequisites installed:
- Python 3.x
- Selenium WebDriver for Firefox
- requests library
- Clone or download this repository.
- Install the required dependencies by running
pip install -r requirements.txt. - Update the
TARGETvariable in the script with your desired target URL.
The script accepts two command-line arguments:
-t, --target: The target URL to test against SiteGround's antibot protection.-ua, --user-agent: A custom User-Agent string (optional). To run the script, execute it using Python:
python bypass_sitesground_antibot.py -t <TARGET_URL> [-ua <USER_AGENT_STRING>]If the script is successful in bypassing SiteGround's antibot protection, you'll see the following output:
Valid Cookie ID and User-Agent
Use in your future requests:
Cookie: _I_: <COOKIE_ID>
Header: User-Agent: <USER_AGENT>
Example:
- curl -I "<TARGET_URL>" -H "Cookie: _I_=<COOKIE_ID>" -H "User-Agent: <USER_AGENT>"- This script is for educational purposes only and should not be used to engage in malicious activities.
- SiteGround's antibot protection may change or evolve over time, making this PoC obsolete. Use at your own risk!