NFN Smith wrote on 9/02/2020 5:26 AM:

<Snip>

One other place that I make occasional use of browser spoofing is if I'm testing access filters on the web page I maintain.  There's a lot of forged stuff that's from botnet access, and by temporarily showing a bad UA that I recognize from the logs, I can verify if my filters are correctly rejecting access that shows that particular UA.  One that I've seen a lot of over the last couple of years is accesses that claim to be "Firefox 40.1" (a version of Firefox that was never valid), and setting Seamonkey to show that one allowed me verify that the web site is rejecting those accesses.

Although the most common reason for spoofing (especially by a Seamonkey user) would be to get around sites that are demanding current versions of Firefox, there's other useful things that you can do with spoofing.

Smith

Whilst reading your post, I was wondering "What would happen if someone were to use a UA string something like 'FF 99.60.1' or 'SM 99.53.1'"

O.K., maybe the '99' might be a little far fetched, but, rather then spoofing the newest version UA or a near future UA, spoof a far future UA and see if it would (always) be 'acceptable'!!

--
Daniel

Win7 User agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 SeaMonkey/2.49.5 Build identifier: 20190609032134

Linux User agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 SeaMonkey/2.49.1 Build identifier: 20171015235623
_______________________________________________
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to