Posted: Wed Jun 10, 2009 7:00 pm
seems like they ban you after X attempts with adblock installed. at least i could get to the page via a proxy (hidemyass).
i think he IP Ban after 5 tries, not sure for how long, but using a proxy allowed me to view his site, both in firefox and ie, firefox with ab+ and the anti script for it.Fantomas wrote:Just tried janno.dk through a completely clean Chrome. Still get redirected. Maybe he does it through IP. He leaves no cookies, so that's not it.
Anyway, there's nothing interesting on his site apart from scam-like adds. And his means are most certainly nothing the major sites will implement.
He also checks the HTTP referrer, and if you come from adblockplus.org you get to the "AidOnline" block page. This happens even if you are using IE with no blocking, as I just tried.Fantomas wrote:Just tried janno.dk through a completely clean Chrome. Still get redirected. Maybe he does it through IP. He leaves no cookies, so that's not it.
I'm not sure what they are doing since there is a lot of javascript code at the bottom that people need to load (and they need to serve..), but they are using the block against googlesyndication.com in the filters.Fantomas wrote:New "anti-script" at http://didaktonline.dk/aidonline-antiscript.php
The script changes everytime you generate it. Supposedly this should make it harder to bypass.
Code: Select all
@@http://pagead2.googlesyndication.com/pagead/abglogo/abg-da-100c-000000.png
Judging from the description at didaktonline.dk (in Danish), the general idea is to check via DOM that the ads are in the right place. Right now, it's the single ad that I have whitelisted above; yet they claim that their script is unique from site to site. They are not using the script.style.display check, like berlingske.dk does.Fantomas wrote:Haha. Nice. Still seems to be quite easy to bypass with the current version of AB. Thanks for taking your time, jesperl. I'm clueless when it comes to coding, so I very much appreciate all you guys' skills.
Razuul wrote:berlingske.dk which is owned by the same company as bt.dk, have now made a sligthly more advanced method of blocking, see below.
The trick of turning collapsing off does not work any more.
adimage.js containsCode: Select all
<script type="text/javascript">var berlingske_media = false;</script> <script type='text/javascript'> var checkad = document.getElementsByTagName("script"); for(var i = 0; i < checkad.length; i++) { var script = checkad[i]; if (script && ((script.getAttribute("src") != null && script.getAttribute("src").match("http://m-serving.com")) || script.style.display == "none")) { parent.location.href = "/apps/pbcs.dll/misc?url=/misc/adblocker.pbs"; } } </script> <script type="text/javascript" src="/script/adimage.js"></script> <script type="text/javascript"> if(!berlingske_media) { parent.location.href = "/apps/pbcs.dll/misc?url=/misc/adblocker.pbs"; } </script>
So it seems they try to get this js file caught in the filter.Code: Select all
var berlingske_media = true;
Adding the exception @@adimage.js allows me to load the page again.
For berlingske.dk, bt.dk and business.dk (all Berlingske Media sites) you need to do two thingsMacy wrote:hello! i dont really know how these things work.. pls give me more info on how to unblock ads at berlingske.dk-been spending the whole day trying to unblock ads..pls help me.
Code: Select all
@@/script/adimage.js
This filter probably blocks elements containing "/adimage." which is what berlingske.dk exploits. They initialize a javascript variable to false, and attempt to download the file /script/adimage.js which changes the variable to true. If the variable is still false after this, they conclude that you are running ABP (since ABP with Easylist will block the download of the file that changes the javascript variable).Jakob wrote:Do like this: "præferencer -> filtre -> uncheck the filter "Easylist Germany (Deutschland) + Easylist"
(The filter I use is "Filter from Dr.Evil (Deutschland)". Wether that is the reason I cannot say ...).
Use this for arto.dk:zeonos wrote:arto.dk now has a notification pop up each time to view a page. telling you, that you have adblock+ or other blocking application.
Code: Select all
@@.arto.*/adframe.$script