(no title)
musabg | 3 years ago
2. Create fake html elements and put unique strings inside. And you can search that string in search engines for finding similar fake sites on different domains.
3. Create fake html element and put all request details in encrypted format. Visit adversary's website and look for that element and flag that ip OR flag the headers.
4. Buy proxy databases, and when any user requests your webpage, check if its a proxy.
5. Instead of banning them, return fake content (fake titles and fake images etc) if proxy is detected OR the ip is flagged.
6. Don't ban the flagged ip's. She/He's gonna find another one. Make them angry and their user's angry so they give up on you.
7. Maybe write some bad words to the user on random places in the HTML when you detect flagged ip's :D So the user's will leave the site and this will reduce the SEO point of the adversary. Will be downranked.
8. Enable image hotlinking protection. Increase the cost of proxying for them.
9. Use @document CSS to hide the stuff when the URL is different.
10. Send abuse mail request to the hosting site.
11. Send abuse mail request to the domain provider.
12. Look for the flagged IPs and try to find the proxy provider. If you find, send mail to them too.
Edit: More ideas sparkled in my mind when I was in toilet:
1. Create fake big css files (10MB etc). And repeatedly download that from the adversary's website. This should cost them too much money on proxies.
2. When you detect proxy, return too big fake HTML files (10GB) etc. That could crash their server if they load the HTML into the memory when parsing.
mkoryak|3 years ago
Reminds me of a time some real estate website hotlinked a ton of images from my website. After I asked them to stop and they ignored me I added an nginx rewrite rule to send them a bunch of pictures of houses that were on fire.
For some reason they stopped using my website as their image host after that.
smaudet|3 years ago
I'm curious if they are stealing anything else, e.g. are they selling ads/tracking, do they replace order forms with their own...
spmurrayzzz|3 years ago
Additionally if they decide to blackhole the fake/honeypot url, since you mentioned they pass along the user agent, you could mixin some token in a randomized user agent string that your scraper uses so that you could duck-type the request on your end to signal when to capture the egress ip.
pwdisswordfish9|3 years ago
davidrupp|3 years ago
graderjs|3 years ago
egberts1|3 years ago
DoctorOW|3 years ago
[0]: https://caniuse.com/mdn-css_at-rules_document
ChrisMarshallNY|3 years ago
JohnAaronNelson|3 years ago
sublinear|3 years ago
SRI is for the situation where a CDN has been poisoned, not this.
ignoramous|3 years ago
blantonl|3 years ago
For example, I had an app developer start stealing API content, so once I determined points to key from them, instead of blocking them I simply randomized the API content details returned to their user's apps.
Hey, API calls look good, the app looks like it is working, no problem right? Well, the users of the app were pissed and the negative reviews rolled in. It was glorious.
kokekolo|3 years ago
LinuxBender|3 years ago
As a side note, their domain is linked in this thread so they are seeing HN in their access logs and probably reading this. It should make for an interesting arms race. Or red/blue team event.
IMSAI8080|3 years ago
eloff|3 years ago
christophilus|3 years ago
Then, write a little script that repeatedly hits that honeypot URL. I quite like this idea.
spiffytech|3 years ago
> 6. Don't ban the flagged ip's. She/He's gonna find another one. Make them angry and their user's angry so they give up on you.
There's a popular blog that no longer gets linked on HN.
The author didn't like the discussions HN had around his writing, so any visitors with HN as the referer are shown goatse, a notorious upsetting image, instead of the blog content.
mschuster91|3 years ago
GTP|3 years ago
someweirdperson|3 years ago
aliswe|3 years ago
luch|3 years ago
dspillett|3 years ago
> Create fake big css files (10MB etc). And repeatedly download that from the adversary's website. This should cost them too much money on proxies.
Be careful when doing things like this, including the shock image option mentioned in other comments, as then it could become an arsehole race with them trying to DoS your site in retribution. Then again, going through more official channels could also get the same reaction, so…
> When you detect proxy, return too big fake HTML files (10GB) etc. That could crash their server if they load the HTML into the memory when parsing.
Make sure you are setup to always compress outgoing content, so that you can send GBs of mostly single-token content with MBs of bandwidth.
scarmig|3 years ago
Doesn't that also cost you an equal amount? You'll be serving them an equal amount that they proxy to the end user.
It's not even necessarily a cost for them; you're assuming that the host is owned and paid for by the abuser. If it's simply been hijacked (quite possible), you're just racking up costs for another victim.
MadVikingGod|3 years ago
ambicapter|3 years ago
macNchz|3 years ago
zhfliz|3 years ago
rich_sasha|3 years ago
Not sure how you actually do it and if it serves your purpose but sounded neat.
e1g|3 years ago
[1] https://www.youtube.com/watch?v=jnDk8BcqoR0
rgrieselhuber|3 years ago
gary_0|3 years ago
unknown|3 years ago
[deleted]
RektBoy|3 years ago
Nope, since anybody doing this and it has at least minimum intelligence are using residential botnets as proxies.
unknown|3 years ago
[deleted]
tgtweak|3 years ago
You can also write some obfuscated inline JavaScript that checks the current hostname and compares to the expected one and redirects when not aligned.
aembleton|3 years ago
geocrasher|3 years ago
jwsteigerwalt|3 years ago
stanislavb|3 years ago
auselen|3 years ago
habibur|3 years ago