[ Reply | Next | Previous | Up ]

Re: KEY QUESTION 

From: (///\ ulTRÅX \\\/)
Date: 05 Feb 1999
Time: 22:18:33
Remote Name: 209.240.200.43

Comments

Group: alt.discuss.webtv.hacking Date: Wed, Jan 27, 1999, 9:37pm From: ulTRAX@webtv.net (///\ ulTRÅX \\\/) Re: KEY QUESTION

It's so frustrating posting a serious, on-topic post and nearly 11 hours later there's no response. Anyway... Imagine two identical WTV pages. One is based on a HP, the other at WTV. Both look the same, have identical HTML codes, have identical form actions, elements... everything is identical right down to the last detail. If this page is loaded into our box's ram from the HP.... the Client somehow senses that this is not a "trusted page" and will deactivate all the WTV commands. Yet, if this identical page is downloaded from the WTV server, the Client is somehow signaled that it's OK to allow those WTV codes to be active. The question is.... what is the Client looking for? Unless there's an OK signal sent by the WTV server to the box, I'm left wondering if the box just either looks at the referrer or at the last URL that the box sent a fetch command to. If we can narrow down possible explanations, maybe we can figure out a way to spoof the browser. The point of all this is not merely an intellectual exercise..... WTV is gunning for all our methods for direct access. Better to start thinking ahead.

Last changed: April 21, 1999