Referer spoofing
From Wikipedia, the free encyclopedia
| This article does not cite any references or sources. (March 2008) Please help improve this article by adding citations to reliable sources. Unverifiable material may be challenged and removed. |
In computer security, referer spoofing or ref tar spoofing is the sending of incorrect referer information along with an HTTP request, sometimes with the aim of gaining unauthorized access to a web site. It can also be used because of privacy concerns, as an alternative to sending no referer at all.
[edit] Application
Some subscription sites, especially many pornographic paysites, utilize referer information to secure their materials: only browsers arriving from a small set of approved (login-) pages are given access; this facilitates the sharing of materials among a group of cooperating paysites. If attackers acquire knowledge of these approved referers (which is often trivial because many sites follow a common template), they can then gain free access to the materials.
Spoofing often allows legitimate access to a site's content where the site's web server is configured to block browsers not sending referer headers. Web site owners may do this to disallow hotlinking.
[edit] Tools
Several software tools exist to facilitate referrer spoofing:
- Proxomitron is a proxy capable of referrer spoofing.
- The Mozilla Firefox extension refspoof [1] allows to use a custom referer URL for any site one visits, and provides a mechanism to manage a bookmark list of such referer/site pairs.
- QuickSpoof and Spooph provide the same functionality for the Internet Explorer browser.
- SuperMegaSpoof [2] is a Windows application that supports both browsers and allows users to exchange and rate referer spoofs; it displays advertisements while it is running.

