• WhoRoger@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    ·
    1 year ago

    So I have two questions, first how does a browser stop websites from scanning open ports and second WHY THE FUCK DO WEB SITES SCAN OPEN PORTS

      • WhoRoger@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        1 year ago

        But re 1) I’m so confused, how does the browser have access to such information, never mind an addon?

        I get that browsers can do way more than tcp port 80 these days, but I didn’t know it can do so much, man.

        Or is that sniffing so closely related to the web site itself, i.e. is the actual web server doing it? I would expect that if someone would want to snoop on my network, they’d be using something else than a web server.

        Guess I need an eli10 for modern browsers.

      • perviouslyiner@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        1 year ago

        In the case of ebay at least, the normal ublock origin seems to prevent this (maybe just incidental that it blocked the loading of the port scanning script?)

        Open “web developer tools”, “network” tab and browse to ebay - if uBlock Origin is turned off, after a few seconds you start to see lots of websocket connections as is shown in the article here. With uBlock Origin enabled, I’m not seeing those.

        EDIT: Raymond confirms this [reddit link] and asks for some ideas on how to specifically block malicious connections to localhost

  • Gresham Law/TheyThem@lemmygrad.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 year ago

    “Action” How am I supposed to interpret that?


    Public reasons behind this behaviour according to some oligarchs:

    • Fingerprinting to uniquely identify your machine for future reference.
    • Attempting to determine whether your machine is part of a botnet since botnets often use VNC services over various standard ports to control their bots.

    A German computer magazine (Heise) wrote about this observation and asked eBay for a statement.

    eBay’s answer was:

    There is some widely spread software that is either Malware or legit software which can be misused to steal the eBay password. This software is listening on certain TCP ports.
    By trying to establish a connection to these TCP ports, the JavaScript of the eBay website tries to find out if such software is currently running.

    Now the question is, is it justifiable?
    Partially fingerprinting sure but to this extent No, it’s data hoarding most likely to be sold to the highest better after all those come with vulnerable servers & infected users or some personal endeavours (Which kind? Not an answer that I’m longing for it really).
    Nevertheless, you will have a lot of malicious actors that will gladly take advantage of this opportunity.

    Sources:
    https://security.stackexchange.com/questions/232345/ebay-web-site-tries-to-connect-to-wss-localhostxxxxx-is-this-legit-or-they/232347#232347