• tuna@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    54
    arrow-down
    1
    ·
    5 months ago

    Imagine they have an internal tool to check if the hash exists in their database, something like

    "SELECT user FROM downloads WHERE hash = '" + hash + "';"
    

    You set the pdf hash to be 1'; DROP TABLE books;-- they scan it, and it effectively deletes their entire business lmfaoo.

    Another idea might be to duplicate the PDF many times and insert bogus metadata for each. Then submit requests saying that you found an illegal distribution of the PDF. If their process isn’t automated it would waste a lot of time on their part to find the culprit Lol

    I think it’s more interesting to think of how to weaponize their own hash rather than deleting it

    • thesporkeffect@lemmy.world
      link
      fedilink
      English
      arrow-up
      17
      ·
      5 months ago

      That’s using your ass. This is an active threat to society and it demands active countermeasures.

      I’d bet they have a SaaS ‘partner’ who trawls SciHub and other similar sites. I’ll try to remember to see if there is any hint of how this is being accomplished over the next few days.