Q
27th October 2010, 07:08
Since a few days there is a new Firefox extension called Firesheep which extracts passwords from wifi connections as if it was childsplay... which it is. Websites like Twitter and Facebook are surprisingly careless on this issue and I urge everyone to take a look into this matter as soon as possible. I'll post the blogpost dealing with the issue (http://codebutler.com/firesheep) of the developer of Firesheep here:
Firesheep
When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests.
It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.
This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL. Facebook is constantly rolling out new "privacy" features in an endless attempt to quell the screams of unhappy users, but what's the point when someone can just take over an account entirely? Twitter forced all third party developers to use OAuth then immediately released (and promoted) a new version of their insecure website. When it comes to user privacy, SSL is the elephant in the room.
Today at Toorcon 12 (http://sandiego.toorcon.org/) I announced the release of Firesheep (http://codebutler.github.com/firesheep), a Firefox extension designed to demonstrate just how serious this problem is.
After installing the extension you'll see a new sidebar. Connect to any busy open wifi network and click the big "Start Capturing" button. Then wait.
http://posterous.com/getfile/files.posterous.com/codebutler/R4SK9YORZrJ2Frgy2f3SHFauDrempyLu0myyULhlxAF05wzIAX 6Gn4j79x3c/one.png
As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:
http://posterous.com/getfile/files.posterous.com/codebutler/6nvpA0znHaNMLWR5DvqsHwLD16E6Z7VwkiGHl9RnK2zKvuWSF3 mGMj88Rtgm/two.png
Double-click on someone, and you're instantly logged in as them.
http://posterous.com/getfile/files.posterous.com/codebutler/KBw6HGlZ05ptbrg2kPOMPm2z2o1WxrP8bmAKDEybQVUfIKXEan zqIebB7j3L/three.png
That's it.
Firesheep (http://codebutler.github.com/firesheep) is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way.
Websites have a responsibility to protect the people who depend on their services. They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.
Firesheep
When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests.
It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.
This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL. Facebook is constantly rolling out new "privacy" features in an endless attempt to quell the screams of unhappy users, but what's the point when someone can just take over an account entirely? Twitter forced all third party developers to use OAuth then immediately released (and promoted) a new version of their insecure website. When it comes to user privacy, SSL is the elephant in the room.
Today at Toorcon 12 (http://sandiego.toorcon.org/) I announced the release of Firesheep (http://codebutler.github.com/firesheep), a Firefox extension designed to demonstrate just how serious this problem is.
After installing the extension you'll see a new sidebar. Connect to any busy open wifi network and click the big "Start Capturing" button. Then wait.
http://posterous.com/getfile/files.posterous.com/codebutler/R4SK9YORZrJ2Frgy2f3SHFauDrempyLu0myyULhlxAF05wzIAX 6Gn4j79x3c/one.png
As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:
http://posterous.com/getfile/files.posterous.com/codebutler/6nvpA0znHaNMLWR5DvqsHwLD16E6Z7VwkiGHl9RnK2zKvuWSF3 mGMj88Rtgm/two.png
Double-click on someone, and you're instantly logged in as them.
http://posterous.com/getfile/files.posterous.com/codebutler/KBw6HGlZ05ptbrg2kPOMPm2z2o1WxrP8bmAKDEybQVUfIKXEan zqIebB7j3L/three.png
That's it.
Firesheep (http://codebutler.github.com/firesheep) is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way.
Websites have a responsibility to protect the people who depend on their services. They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.