home *** CD-ROM | disk | FTP | other *** search
- 50 attacks on Netscape - please send the check
-
-
-
-
- 50 Attacks: a.k.a. Why Not to Run Hot Java in your netscape (or other)
- browser:
-
- Concept 1 - Hot Java code that, once started, takes and retains control
- of the viewer. It includes hot buttons, etc. that let you use common
- resources on the net, store favorite places, etc. When you push any
- button in this window, it simulates Hot Java within its own code, but
- all reads and writes contain code to restart the program (such as the
- "remember favorite places" button, etc.).
-
- Attack 1 - It records all entries and sends them to an unfriendly.
- This includes credit card numbers, etc.
-
- Attack 2 - It reroutes all traffic through a known site to record
- information about all of your accesses.
-
- Attack 3 - It selectively multiplies dollar values on purchases up
- by a factor of 10 when you authorize purchases through their store.
-
- Attack 4 - It reroutes all purchases through their intermediary and
- adds 20% for the service, thus becoming the middle person in all
- your transactions.
-
-
- Attack 5 - It replaces select information from select sites
- with false or misleading information - particularly about
- the competition.
-
-
- Attack 6 - It reports certain sites as down, thus damaging
- the reputation of those sites.
-
-
- Attack 7 - It sends requests to sites and ignores their
- answers to increase hit rates on key vendors that pay for
- their W3 sites based on usage.
-
- Attack 8 - It gets dirty pictures using your credit card information
- and sends it to another recipient.
-
- Attack 9 - It implements an anonymous remailer for smut, thus making
- you the smut capital of the network.
-
- Attack 10 - It waits till you save another Java code from the
- net and replaces the code with its own code and a pointer to the
- code you thought you got.
-
- Attack 11 - It waits till you save a file and overflows your
- disk with garbage.
-
- Attack 12 - It sends displays that flash on the screen at a
- rate that causes epilectic seizures.
-
- Attack 13 - It puts up subliminal messages to cause you to
- accept its subsequent request to overwrite a .com file onto your
- disk.
-
- Attack 14 - It analyzes your typing style to determine psychological
- factors and stores that information in a database.
-
- Attack 15 - It analyzes your typing style to determine psychological
- factors and, if you are a child, connects you to child pornography
- rings.
-
- Attack 16 - It sends requests for URLs to numerous addresses on
- your network, records results, and returns a network map to the
- attacker.
-
- Attack 17 - It uses spare time when you are not computing to
- participate in codebreaking activities, including the
- breaking of netscape codes.
-
- Attack 18 - It sends massive quantities of email to mailing lists
- creating the impression that you are not a nice person (a spammer)
-
- Attack 19 - When it recieves incoming email, it sends copies to
- newsgroups who now have access to all your personal incoming mail.
-
- Attack 20 - When you send outgoing email, it sends copies to
- newsgroups who now have access to all your personal outgoing mail.
-
- Attack 21 - When you send outbound email, it adds insulting or
- abusive humor to the end of your signature line.
-
- Attack 22 - It is used to send and receive email as part of a
- right wing group's coordination activities aimed at overthrowing the
- government.
-
- Attack 23 - It slowly fades your screen till you think the
- display is going bad, forcing you to buy a new display.
-
- Attack 24 - It slowly degrades performance causing you to
- think you need a faster computer.
-
- Attack 25 - It sends threatenning email to the President under
- your name, getting you arrested.
-
- Attack 26 - It sends embarassing email to the New York Times getting
- you fired.
-
- Concept 2 - Hot Java code that sends all of your messages
- through my computer and gets the results back from my
- computer by rewriting URLs on-the-fly.
-
- Attack 27 - Attack 3 from above, but with more intelligence so that
- amounts are changes less obviously.
-
- Attack 28 - Attack 4 from above, but it also changes the
- costs on incoming information so that you can't detect the
- price change in the process.
-
- Attack 29 - Attack 5 from above, except that it is more
- sophistocated -like creating misspellings or poor formatting
- or moving the locations in maps so that when you push on
- one part of a map, it sends a different part to ther
- server.
-
- Attack 30 - Attack 6 from above, except that instead of
- reporting servers down, it makes them seem very slow, or
- misses lines of pictures,etc. tomake them look bad but
- without causing trouble reports .
- Attack 31 - Records all credit card transactions and forward
- information to services that pay to know what you buy.
-
- Attack 32 - Determines whether you look at dirty pictures
- and, if so,sends the information to criminals to use
- against you in shakedowns.
-
- Attack 33 - Replaces legitimate calls to children's pages with child
- pornography - including solicitations for where you can
- become a star.
-
- Attack 34 - Adds subliminal messages to sound files that
- cause you to enter a murderous rage (as in the claims about
- acid rock a few years back).
-
- Attack 35 - Adds dirty pictures to video files causing you to become
- sex-crazed and commit sex crimes and have bad dreams.
-
- Attack 36 - Causes simulated waviness on the screen, resulting in
- dizziness and increased sick time at work.
-
- Attack 37 - Introduces high frequency buzzing that irritates people
- and causes them to become more violent and less cooperative.
-
- Attack 38 - Introduces low frequency beating (similar to the
- tactics used against the Branch Dividians and in Viet Nam)
- to weaken your resolve and then asks you to confirm the
- upload of a program.
-
- Attack 39 - Creates subliminal feedback to your use of the Web toget
- you to tend toward particular services and away from others.
-
- Attack 40 - Adds background advertising to all your pictures.
-
- Attack 41 - Replaces the background information provided by
- Web sites with the attackers background advertising.
-
- Attack 42 - Shifts frequencies of sound files from select
- other sites so they seem off-pitch and don't reflect well
- on those companies.
-
- Attack 43 - Reroutes all of your Web requests through the
- NSA and CIA so they can do better intelligence.
-
- Attack 44 - Causes select Web sites to require User ID and Password
- information before use (particularly company Web sites) so as to get
- you to reveal your UIDs and passwords.
-
- Attack 45 - Renames Web sites so that your remembered sites only
- work for a few days and then the pointers appear to go away.
-
- Attack 46 - Puts a lot of really interesting things on your
- screen, thus making you believe that the Web is really
- great, and then removes them from accessibility when you
- try to get them again.
-
- Attack 47 - Universally replaces the work AND with OR in all
- Web information.
-
- Attack 48 - Randomizes all 5-digit numbers sent via the Web,
- thus confusing all zip codes contained in address fields.
-
- Attack 49 - Sends a series of high frequency sounds combined
- with screen flashes designed to cause permanent brain
- damage.
-
-
- Concept 3 - There is a chosen plaintext attack against the RSA
- (published in the 1980s in a Crypto conference (IACR?).
-
- Attack 50 - Use your Hot Java capability to sign selected
- message after message till the attacker derives your private key.
- I think this takes one or two messages per bit of private key.
-
- Bonus Attack (no extra charge) - If they use your PGP random
- number information, they get your PGP key too!
-
-
- Netscape: Please send your check for US$50,000 to the address below.
-
- \emdash -> See: Info-Sec Heaven at URL http://all.net Management Analytics -
- 216-686-0090 - PO Box 1480, Hudson, OH 44236
-
- --
- =-GRAHAM-JOHN BULLERS=-=AB756@FREENET.TORONTO.ON.CA=-=ALT.2600.MODERATED-=
- Lord grant me the serenity to accept the things I cannot change.The courage
- to change the things I can.And the wisdom to hide the bodies of the people
- =-=-=-=-=-=-=-=-=I had to kill because they pissed me off=-=-=-=-=-=-=-=-=-=
-
-