[4909] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-97.20 - JavaScript Vulnerability

daemon@ATHENA.MIT.EDU (Jauder Ho)
Mon Jul 14 04:51:48 1997

Date: 	Fri, 11 Jul 1997 10:11:33 -0700
Reply-To: Jauder Ho <jauderho@CARUMBA.COM>
From: Jauder Ho <jauderho@CARUMBA.COM>
X-To:         Drew Dean <ddean@CS.PRINCETON.EDU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199707101901.PAA23123@caesar>

        It's pretty funny that people are actually considering this a
webspoofing technique this late. I wrote something like this back in 95 as
something fun. Basically I took a url, sucked in down, parsed the data
through chef (for those of you who don't know what this is, it's a lex
proggie that translates everything you pass to it in to mock swedish a la
the Muppets :) and from then on you can navigate the web in mock swedish!
:) I can post the perl source if there is interest except it wil take some
work to get it working again. I would prefer to rewrite it using CGI.pm :)

turtle%texturizer% ls -l hmm.cgi
-rwxr-xr-x   1 jauderho staff        6050 Dec  5  1995 hmm.cgi*

--Jauder
On Thu, 10 Jul 1997, Drew Dean wrote:

> We used similar features in our Web Spoofing paper, which was done
> last year.  See http://www.cs.princeton.edu/sip/Publications.html for
> more information.  The paper will be appearing at NISSC this fall
> (Baltimore, MD, October 6 - 10).
>
> Drew Dean
> Secure Internet Programming Group
> Dept. of Computer Science, Princeton Univeristy
>


                           .sig under construction

home help back first fref pref prev next nref lref last post