Edit: I created a library that enables to detect bots and crawlers using fingerprinting. It is still in development but you can start using it. The code is available on Github.
In August I wrote a post on techniques to detect Chrome headless. Since then I received messages saying that some of them were not working anymore. After doing few tests on my computer, it happens that the last three techniques that used WebGL, feature detection as well as the size of the image used by Chrome when an image fails to load can’t be used anymore to detect Chrome headless.
Thus, in this post I’ll present techniques (new and from the previous post) that can be used to detect Chrome headless.
User agent (Old)
We start with a naive technique already presented in the previous post: the user agent. It is the attribute commonly used to detect the OS as well as the browser of the user. On a Linux computer with Chrome version 63 it has the following value: “Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/63.0.3071.115 Safari/537.36”
Thus, we can check for the presence of Chrome headless:
User agent can also be obtained from the HTTP headers. However, it is trivial to spoof if it in both cases.
In order to automate Chrome headless, a new property webdriver is added to the navigator object (see Chromium code). Thus, by testing if the property is present it is possible to detect Chrome headless.
window.chrome is an object that seems to provide features to Chrome extension developpers. While it is available in vanilla mode, it’s not available in headless mode.
It’s currently not possible to handle permissions in headless mode. Thus, it leads to an inconsistent state where Notification.permission and navigator.permissions.query report contradictory values.
Finally, I present two other methods that were already present in the previous post.
navigator.plugins returns an array of plugins present in the browser. Typically, on Chrome we find default plugins, such as Chrome PDF viewer or Google Native Client. On the opposite, in headless mode, the array returned contains no plugin.
PhD opportunity: if you are interested in doing a PhD on browser fingerprinting and/or privacy, feel free to contact me by email.