Hi, while looking through the site for an RSS/Atom feed URL or other I saw something kind of strange. Usually stuff is proxy blocked or just blocked from forum moderation automatically but I’m not so web developer savvy to know if these sites are hard coded blocking of said sites or simply the site is being exploited in an XML/XSS attack vector OR it’s an SEO technique?
:root topadblock, :root input[onclick^=“window.open('http://www.FriendlyDuck.com/”], :root img[alt^=“Fuckbook”], :root iframe[src^=“http://static.mozo.com.au/strips/”], :root iframe[src^=“http://cdn2.adexprt.com/”], :root iframe[id^=“google_ads_iframe”], :root header#hdr + #main > div[data-hveid], :root div[id^=“zergnet-widget”], :root div[id^=“traffective-ad-”], :root div[id^=“sticky_ad_”], :root div[id^=“q1-adset-”], :root div[id^=“proadszone-”], :root div[id^=“mainads”], :root div[id^=“lazyad-”], :root div[id^=“google_dfp_”], :root div[id^=“google_ads_iframe_”], :root div[id^=“drudge-column-ads-”], :root div[id^=“dmRosAdWrapper”], :root div[id^=“div-gpt-ad”], :root div[id^=“div-adtech-ad-”], :root div[id^=“dfp-slot-”], :root div[id^=“dfp-ad-”], :root a[data-obtrack^=“http://paid.outbrain.com/network/redir?"], :root a[href^=“http://www1.clickdownloader.com/”], :root div[id^=“cns_ads_”], :root #\5f admvnlb_modal_container, :root div[id^=“adspot-”], :root input[onclick^=“window.open('http://www.friendlyduck.com/”], :root div[id^=“ads300_250-widget”], :root div[id^=“ads250_250-widget”], :root div[id^=“adrotate_widgets-”], :root div[id^="adfox”], :root div[id^=“ad_script_”], :root div[id^=“ad_rect_”], :root #content > #right > .dose > .dosesingle, :root div[id^=“ad_bigbox_”], :root div[id^=“ad-server-”], :root div[id^=“acm-ad-tag-”], :root div[id^=“ADV-SLOT-”], :root div[data-native_ad], :root a[href^=" http://n47adshostnet.com/"], :root div[data-id^=“CarouselPLA-”] > .kzwEHf, :root div[class^=“proadszone-”], :root div[class^=“pane-google-admanager-”], :root a[href^=“http://adultgames.xxx/”], :root a[href^=“http://semi-cod.com/clicks/”], :root div[class^=“index_displayAd_”], :root a[href^=“http://www.affbuzzads.com/affiliate/”], :root div[class^=“index_adBeforeContent_”], :root div[class^=“index_adAfterContent_”], :root iframe[src^=“http://cdn1.adexprt.com/”], :root a[href^=“http://dwn.pushtraffic.net/”], :root div[class^=“hp-ad-rect-”], :root div[class^=“block-openx-”], :root div[class^=“ads-partner-”], :root div[class^=“ad_position_”], :root div[class^=“ad_border_”], :root a[href^=“http://adprovider.adlure.net/”], :root div[class^=“Ad__container”], :root div[class*=“AdInArticle”], :root div > [class][onclick*=".updateAnalyticsEvents"], :root a[href^=“http://internalredirect.site/”], :root bottomadblock, :root a[href^=“http://c.actiondesk.com/”], :root aside[id^=“div-gpt-ad”], :root div[id^=“ad-cid-”], :root a[href^=“http://lp.ezdownloadpro.info/”], :root a[href^=“uploaded.net - Registrieren”], :root aside[id^=“advads_ad_widget-”], :root aside[id^=“adrotate_widgets-”], :root a[href^=“http://li.cnet.com/click?"], :root div[id^=“div-ads-”], :root a[href^=“http://at.atwola.com/”], :root a[onmousedown^=“this.href='https://paid.outbrain.com/network/redir?"][target=”_blank”] + .ob_source, :root[/spoiler]I only posted a small sample of what it entails, I get that this might be something outside 343i’s scope. You can recreate and view the entire deposition of text/css by inspect element/source CTRL+F “RSS” enter and it will pull up. I can make a short video to send if needed.
I’d be happy if this was some Section 3 egg hunt but it objectively looks like one of those social media companies that boasts bringing numbers to small businesses but in light use off the wall tactics to steal traffic from heavily traversed sites via injected code and whatever else out there.