50 attacks on Netscape - please send the check 50 Attacks: a.k.a. Why Not to Run Hot Java in your netscape (or other) browser: Concept 1 - Hot Java code that, once started, takes and retains control of the viewer. It includes hot buttons, etc. that let you use common resources on the net, store favorite places, etc. When you push any button in this window, it simulates Hot Java within its own code, but all reads and writes contain code to restart the program (such as the "remember favorite places" button, etc.). Attack 1 - It records all entries and sends them to an unfriendly. This includes credit card numbers, etc. Attack 2 - It reroutes all traffic through a known site to record information about all of your accesses. Attack 3 - It selectively multiplies dollar values on purchases up by a factor of 10 when you authorize purchases through their store. Attack 4 - It reroutes all purchases through their intermediary and adds 20% for the service, thus becoming the middle person in all your transactions. Attack 5 - It replaces select information from select sites with false or misleading information - particularly about the competition. Attack 6 - It reports certain sites as down, thus damaging the reputation of those sites. Attack 7 - It sends requests to sites and ignores their answers to increase hit rates on key vendors that pay for their W3 sites based on usage. Attack 8 - It gets dirty pictures using your credit card information and sends it to another recipient. Attack 9 - It implements an anonymous remailer for smut, thus making you the smut capital of the network. Attack 10 - It waits till you save another Java code from the net and replaces the code with its own code and a pointer to the code you thought you got. Attack 11 - It waits till you save a file and overflows your disk with garbage. Attack 12 - It sends displays that flash on the screen at a rate that causes epilectic seizures. Attack 13 - It puts up subliminal messages to cause you to accept its subsequent request to overwrite a .com file onto your disk. Attack 14 - It analyzes your typing style to determine psychological factors and stores that information in a database. Attack 15 - It analyzes your typing style to determine psychological factors and, if you are a child, connects you to child pornography rings. Attack 16 - It sends requests for URLs to numerous addresses on your network, records results, and returns a network map to the attacker. Attack 17 - It uses spare time when you are not computing to participate in codebreaking activities, including the breaking of netscape codes. Attack 18 - It sends massive quantities of email to mailing lists creating the impression that you are not a nice person (a spammer) Attack 19 - When it recieves incoming email, it sends copies to newsgroups who now have access to all your personal incoming mail. Attack 20 - When you send outgoing email, it sends copies to newsgroups who now have access to all your personal outgoing mail. Attack 21 - When you send outbound email, it adds insulting or abusive humor to the end of your signature line. Attack 22 - It is used to send and receive email as part of a right wing group's coordination activities aimed at overthrowing the government. Attack 23 - It slowly fades your screen till you think the display is going bad, forcing you to buy a new display. Attack 24 - It slowly degrades performance causing you to think you need a faster computer. Attack 25 - It sends threatenning email to the President under your name, getting you arrested. Attack 26 - It sends embarassing email to the New York Times getting you fired. Concept 2 - Hot Java code that sends all of your messages through my computer and gets the results back from my computer by rewriting URLs on-the-fly. Attack 27 - Attack 3 from above, but with more intelligence so that amounts are changes less obviously. Attack 28 - Attack 4 from above, but it also changes the costs on incoming information so that you can't detect the price change in the process. Attack 29 - Attack 5 from above, except that it is more sophistocated -like creating misspellings or poor formatting or moving the locations in maps so that when you push on one part of a map, it sends a different part to ther server. Attack 30 - Attack 6 from above, except that instead of reporting servers down, it makes them seem very slow, or misses lines of pictures,etc. tomake them look bad but without causing trouble reports . Attack 31 - Records all credit card transactions and forward information to services that pay to know what you buy. Attack 32 - Determines whether you look at dirty pictures and, if so,sends the information to criminals to use against you in shakedowns. Attack 33 - Replaces legitimate calls to children's pages with child pornography - including solicitations for where you can become a star. Attack 34 - Adds subliminal messages to sound files that cause you to enter a murderous rage (as in the claims about acid rock a few years back). Attack 35 - Adds dirty pictures to video files causing you to become sex-crazed and commit sex crimes and have bad dreams. Attack 36 - Causes simulated waviness on the screen, resulting in dizziness and increased sick time at work. Attack 37 - Introduces high frequency buzzing that irritates people and causes them to become more violent and less cooperative. Attack 38 - Introduces low frequency beating (similar to the tactics used against the Branch Dividians and in Viet Nam) to weaken your resolve and then asks you to confirm the upload of a program. Attack 39 - Creates subliminal feedback to your use of the Web toget you to tend toward particular services and away from others. Attack 40 - Adds background advertising to all your pictures. Attack 41 - Replaces the background information provided by Web sites with the attackers background advertising. Attack 42 - Shifts frequencies of sound files from select other sites so they seem off-pitch and don't reflect well on those companies. Attack 43 - Reroutes all of your Web requests through the NSA and CIA so they can do better intelligence. Attack 44 - Causes select Web sites to require User ID and Password information before use (particularly company Web sites) so as to get you to reveal your UIDs and passwords. Attack 45 - Renames Web sites so that your remembered sites only work for a few days and then the pointers appear to go away. Attack 46 - Puts a lot of really interesting things on your screen, thus making you believe that the Web is really great, and then removes them from accessibility when you try to get them again. Attack 47 - Universally replaces the work AND with OR in all Web information. Attack 48 - Randomizes all 5-digit numbers sent via the Web, thus confusing all zip codes contained in address fields. Attack 49 - Sends a series of high frequency sounds combined with screen flashes designed to cause permanent brain damage. Concept 3 - There is a chosen plaintext attack against the RSA (published in the 1980s in a Crypto conference (IACR?). Attack 50 - Use your Hot Java capability to sign selected message after message till the attacker derives your private key. I think this takes one or two messages per bit of private key. Bonus Attack (no extra charge) - If they use your PGP random number information, they get your PGP key too! Netscape: Please send your check for US$50,000 to the address below. \emdash -> See: Info-Sec Heaven at URL http://all.net Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236 -- =-GRAHAM-JOHN BULLERS=-=AB756@FREENET.TORONTO.ON.CA=-=ALT.2600.MODERATED-= Lord grant me the serenity to accept the things I cannot change.The courage to change the things I can.And the wisdom to hide the bodies of the people =-=-=-=-=-=-=-=-=I had to kill because they pissed me off=-=-=-=-=-=-=-=-=-=