TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Firesheep: Easy HTTP session hijacking from within Firefox

714 pointsby cdineover 14 years ago

52 comments

gaoshanover 14 years ago
For anyone who has SSH access to a server (but not VPN) and is wondering what to do when you need some security in a pinch, here is a quick fix...<p>Open an ssh connection to a server you have access to using something like the following:<p>ssh -ND 8887 -p 22 rufus@12.120.186.8<p>where 8887 is the port on your laptop that you will tunnel through, -p 22 is the port the ssh server is on (22 is the default but I use a different port so I am used to specifying this) and the rest is your username and the address of the server<p>Set your network to point to the proxy. On a Mac that would be…<p>... Open Network Preferences…<p>... Click Advanced…<p>... Click Proxies…<p>... Check the SOCKS Proxy box then in the SOCKS Proxy Server field enter localhost and the port you used (8887)<p>... OK and Apply and you are done!<p>Now you can surf safely.
评论 #1828789 未加载
评论 #1829109 未加载
评论 #1829294 未加载
评论 #1828761 未加载
评论 #1829969 未加载
评论 #1829863 未加载
评论 #1829031 未加载
评论 #1829938 未加载
评论 #1828844 未加载
评论 #1830522 未加载
评论 #1829144 未加载
评论 #1829823 未加载
ramanujanover 14 years ago
There are probably going to be a lot of people negatively affected by this for quite some time to come. One thing to point out is that there are grades of things. There is "public", and then there is "top hit on Google". Similarly, there is "insecure" and then there is "simple doubleclick tool to facilitate identity theft".<p>How many millions of dollars and man hours is it going to take to lock down every access point? How many new servers are going to be needed now that https is used for everything and requests can't be cached?<p>America was a better place when people could keep their doors unlocked, and when someone's first response to a break-in was to blame the <i>criminal</i>. By contrast it's fashionable among a certain set (no doubt including the author of this mess, Mr. Butler himself) to hold that the real culprits are the door manufacturers. What said facile analysis excludes, of course is that there is <i>always</i> a greater level of security possible. The level we currently employ reflects our tradeoffs between the available threats and the cost/convenience loss of bolting our doors and putting finials on our gates.<p>Butler has simply raised the threat level for everyone. He did not invent a new lock or close a hole. He's now forcing lots of people to live up to <i>his</i> level of security. Congratulations to the new Jason Fortuny.
评论 #1829535 未加载
评论 #1829122 未加载
评论 #1829819 未加载
评论 #1829877 未加载
评论 #1829090 未加载
评论 #1831284 未加载
评论 #1829170 未加载
评论 #1829307 未加载
评论 #1831225 未加载
评论 #1833006 未加载
评论 #1829420 未加载
评论 #1837291 未加载
评论 #1831709 未加载
评论 #1831642 未加载
评论 #1829202 未加载
评论 #1830094 未加载
评论 #1830969 未加载
评论 #1830968 未加载
carbon8over 14 years ago
This is kind of a big deal. Not a whole lot of people are aware of this vulnerability and among those who are it's likely only a small subset that knew how to exploit it until now. I suspect all of the coffee shops in the college town where I live will have people using this starting tomorrow.<p>I've personally been working from cafes and tunneling everything through SSH for years, but in my experience almost no one else does this.
评论 #1828636 未加载
评论 #1828201 未加载
kogirover 14 years ago
This is one of many reasons Loopt has used SSL for all[1] traffic from the very beginning. At least WiFi has fairly limited range. Cell networks[2] (and satellite internet[3]) can be sniffed miles away.<p>In addition to making session hijacking harder, using SSL keeps crappy proxies from caching private data. Remember when some AT&#38;T users were getting logged in as other users on Facebook's mobile site? The cause was a mis-configured caching proxy.<p>Raising awareness of issues like this gets them fixed. Until a service's users demand SSL, it won't be offered. Unless the service is Loopt :) It's not a noticeable computational burden, but it does increase latency and cost money (for certs).<p><pre><code> 1. Not images 2. Older GSM crypto can be hacked in real time with rainbow tables now 3. Usually not encrypted at all</code></pre>
评论 #1829258 未加载
评论 #1832629 未加载
Groxxover 14 years ago
<i>Nice</i>. A solid demonstration to show next time your webmaster doesn't want to set up SSL everywhere.<p>That said, the current cartel-like setup of certificate authorities (protection money and everything!) makes SSL annoying and expensive if you want the browser to not have a fit. Especially for small-scale projects. But there's really no excuse for larger sites.
评论 #1828861 未加载
评论 #1828118 未加载
评论 #1828103 未加载
评论 #1828460 未加载
chaosmachineover 14 years ago
<i>"Double-click on someone, and you're instantly logged in as them."</i><p>Ouch. I think it's time to set up that VPN I've been putting off...
评论 #1828449 未加载
patio11over 14 years ago
Thanks for posting this. It convinced me to upgrade SSL support from "something that would be nice to implement if I was bored someday" (BCC is not exactly security critical -- except, on reflection, the admin pages) to "drop everything and get it done."
评论 #1829682 未加载
leftnodeover 14 years ago
I thought the title of this submission was slightly misleading. This is not a security vulnerability from within Firefox, it's a Firefox plugin to reveal security vulnerabilities in a wide range of websites.
评论 #1828037 未加载
评论 #1828010 未加载
评论 #1828099 未加载
eapenover 14 years ago
Sites that are tracked:<p>amazon basecamp bitly cisco cnet dropbox enom evernote facebook flickr foursquare github google gowalla hackernews harvest live nytimes pivotal sandiego_toorcon slicemanager tumblr twitter wordpress yahoo yelp
mulokaover 14 years ago
Thanks to the EFF and the Tor Project we need not worry as much thanks to their HTTPS Everywhere project, a plugin for Firefox: <a href="http://www.eff.org/https-everywhere/" rel="nofollow">http://www.eff.org/https-everywhere/</a><p>Any questions:<p><a href="http://www.eff.org/https-everywhere/faq" rel="nofollow">http://www.eff.org/https-everywhere/faq</a>
评论 #1828582 未加载
评论 #1828905 未加载
评论 #1828583 未加载
评论 #1829748 未加载
kijinbearover 14 years ago
Be careful when trying this out. You could be breaking a law or two...
评论 #1828439 未加载
uptownover 14 years ago
The explanation I've always heard for not using HTTPS 100% of the time is that it puts an substantial load on the server, and for many sites it's overkill. Setting aside the subjective topic of "overkill" ... how much more CPU-intensive is it to serve pages over HTTPS compared to HTTP?
评论 #1828253 未加载
评论 #1828217 未加载
评论 #1828144 未加载
thought_alarmover 14 years ago
Does this kind of wi-fi sniffing work with WEP or WPA encrypted networks? What about 802.1x?
评论 #1830272 未加载
评论 #1828730 未加载
atomicalover 14 years ago
Is there another application besides the FF extension to dump the packets and process them? How does this work?<p>EDIT: Sorry, I asking specifically how this FF extension works.
评论 #1828042 未加载
评论 #1828064 未加载
jmreidover 14 years ago
Makes a strong case for everyone to start tunneling their traffic back to a trusted network.<p>I've been trying out sshutttle &#60;<a href="http://github.com/apenwarr/sshuttle&#62;" rel="nofollow">http://github.com/apenwarr/sshuttle&#62;</a>. It only tunnels TCP traffic, so you still have DNS and UDP traffic on the local network.
mike_esspeover 14 years ago
Always use encryption, while using open wifi. I use openvpn ( <a href="http://openvpn.net/" rel="nofollow">http://openvpn.net/</a> ) for this.
ddragerover 14 years ago
I think this should be a call to arms to network, web and system admins everywhere. This is a problem that everyone knows about but nobody wants to do anything about since it requires additional setup. Usually the barrier is a technical issue that the end user can't figure out. However since submitting forms via SSL is something the developer can do without impacting the end user at all, this is a simple fix for just about any website. You need a static IP and an SSL certificate, and they are both cheap.<p>Running out of IPv4 space is an issue in this regard, but hopefully with more people wanting SSL it will push providers to IPv6 quicker. Nicely done EricButler!
jdunckover 14 years ago
Title is a bit misleading. This is a front-end to libpcap, and can be used for hijacking any token-based-auth, not just HTTP.<p>It just happens that they released w/ support for social networks as a demonstration.
mcmcover 14 years ago
It seems fine to just enable SSL everywhere. But indulge me for a second in thinking of alternate solutions.<p>Instead of sending a cookie, send a piece of javascript code (as part of the SSL-cloaked login handshake) that generates a new cookie for each request, and consider each new cookie in this sequence a "one time use" token. You can turn off SSL for subsequent requests and just use one of these new cookies each time to verify identity because an attacker won't have your cookie generator.<p>This javascript is really just an encryption key and algorithm, and if you implement it correctly, it should take quite some time for snoopers to reverse engineer the encryption key based on a sequence of one-time-use cookies.<p>Logistically, I suppose you would run into some trouble setting a new cookie for each request depending on how the page is loaded. For instance, if the user pastes a url into a new tab manually, then this system wouldn't have a chance to set the new cookie first.<p>However, I think you could architect a system that solves this. For instance, put the javascript token generator source in local storage. If a new page loads with an invalid key, that new page can just get the cookie generator code out of local storage and manually refresh the page's content by making a request with a valid token. This should be quick enough for most users not to notice, in the rare case that they circumvent the site's usual navigation.<p>A downside is obviously that the content itself is still not safe, but at least the account would be. Any thoughts?
评论 #1828585 未加载
评论 #1830748 未加载
meelashover 14 years ago
Wow, good work. And pretty scary- imagine what one could do with this on any college campus.
评论 #1828196 未加载
dacortover 14 years ago
Wow, I've been wanting to do this for a while to raise awareness. Great implementation by plugging it into Firefox - well done.
amanuelover 14 years ago
You can slightly reduce the dangers stated here by logging out immediately after you are done doing whatever it is you are doing. This will make the captured session useless.<p>The best solution is of course to get a VPN acct and use it when you are at free/open wifi spots. I use WiTopia (www.witopia.net)
评论 #1828203 未加载
chrisbroadfootover 14 years ago
Has anyone checked the source code to check that the passwords aren't sent to the author's website? :)
评论 #1828598 未加载
评论 #1828470 未加载
评论 #1831756 未加载
gregwebsover 14 years ago
What can an end user do to minimize this?<p>This exploit is for insecure Wifi networks- so only using encrypted Wi-fi or Ethernet would seem to remove this attack vector. Is there a real risk that someone (besides the government) can see your cookie?
评论 #1828184 未加载
评论 #1828226 未加载
评论 #1828126 未加载
ianhawesover 14 years ago
This looks really cool. I can't wait to try this out. Very nice work, Eric.
评论 #1828011 未加载
评论 #1830208 未加载
评论 #1832060 未加载
DJNover 14 years ago
The main problem will be with SaaS apps that allow custom domains names (i.e. <i>mywebsite.com</i> instead of <i>mywebsite.mysaasprovider.com</i>).<p>I made an early decision to enable SSL everywhere in Trafficspaces with the obvious downside being that I need to allocate a dedicated IP address each time someone requests a custom domain name.<p>I used to get worried that perhaps it would have been better to <i>only</i> provide SSL in specific stages (such as sign-in and payment) and <i>only</i> through a generic domain name. Not any more.<p>Firesheep clearly vindicates that decision.
评论 #1831623 未加载
ElbertFover 14 years ago
Why don't Facebook and other major sites check the user agent and IP address of client as well, instead of just relying on a cookie? That would solve this problem in 99% of the cases, right?
评论 #1828131 未加载
icodeover 14 years ago
It states that it works for "open networks". What does that mean? All networks that you have access to? Including those in Cafes where they give you a key to log in? Or just networks that are completely open? And why does it work at all? I thought the wlan access point would encrypt the communication between itself and the computer. Would be interesting, which protocols are vulnurable to this and which are not.<p>I guess the logging of raw wlan packets is a one-liner under linux? Does anybody know it?
charlesshonstonover 14 years ago
So wait... this works regardless of wireless card? I've tried to use BackTrack on my mac before and it failed due to the card not being able to run in passive mode.
评论 #1829012 未加载
petenixeyover 14 years ago
What a shame. There are going to be so many kids whose Facebook accounts get broken into and abused this week as a result of this.
jayphelpsover 14 years ago
Doesn't work in 3.6.4, even if you override install it or change the minVersion (which is 3.6.10)<p>Once I upgraded to 3.6.10 worked awesome.
s3grahamover 14 years ago
SSL requires a unique IP per hostname, correct? Maybe <i>this</i> will be what actually ends up getting IPv6 going... :)
评论 #1829163 未加载
pilomover 14 years ago
Anyone going to get HN on HTTPS? I'm very partial to my kharma points and don't want anyone to log in as me!
JshWrightover 14 years ago
It's an interesting assortment of sites that are "supported" out of the box. Some of them are pretty harmless (bit.ly, Flickr), some could cause some pretty serious hassles (Google, Amazon), and some could be absolutely devastating (Deleting someone's Slicehost account? Ouch...).
marcuswestinover 14 years ago
The sidebar is not showing up for me after installing and restarting.<p>Firefox 3.6.11 OS X 10.6 firesheep-0.1-1.xpi
评论 #1828066 未加载
评论 #1828043 未加载
al_jamesover 14 years ago
What does this mean for HTTP basic authentication? How about digest access authentication?
评论 #1829196 未加载
robhuover 14 years ago
On my Macbook Pro (purchased 1 year ago) it doesn't seem to be able to capture traffic on my wifi. It can see sessions originating from another browser on the same Mac, but not other macs on the wifi network.<p>Is there a way of debugging what's going on?
评论 #1829344 未加载
jaweeover 14 years ago
I'm eagerly waiting trying this out once a Linux version becomes available.. looks very nice! Unfortunately I don't have a Windows or OS X installation available to me at the moment.
Ripstover 14 years ago
PHP session_regenerate_id(true)<p><a href="http://www.php.net/manual/en/function.session-regenerate-id.php" rel="nofollow">http://www.php.net/manual/en/function.session-regenerate-id....</a>
flexterraover 14 years ago
Here is a simple tutorial on how to set up an SSH Tunnel for Mac OS X <a href="http://bit.ly/cffjOY" rel="nofollow">http://bit.ly/cffjOY</a><p>This way all your communication is encrypted
评论 #1828584 未加载
评论 #1828487 未加载
评论 #1828535 未加载
rfuggerover 14 years ago
It would help a bit if there was a way to automatically encrypt sessions on an open wifi access point without requiring a password to connect.
pberryover 14 years ago
On a positive note, at least a lot of people will be updating to the latest secure version of Firefox to run it.
dennisgorelikover 14 years ago
On the other hand, stealing somebody's real life identity is not that hard either. But it does not happen too often, in part because it's illegal. Stealing somebody's cookie on the Internet is a crime just as is stealing somebody's driver's license. Although technical solution to this security hole is desirable, it's not the only solution available.
AndyKelleyover 14 years ago
Linux installation needs work. README is empty, and the INSTALL says use ./configure which doesn't exist. ./autogen.sh complains about needing xulrunner-sdk path, which is isn't something normal for linux.<p>Edit: Oops! Linux support is "on the way." I guess I assumed since linux is the easiest platform to get your driver to go into monitor mode.
geuisover 14 years ago
I just tried this here in a coffee shop. This is fucking evil.
gasullover 14 years ago
I couldn't install it on FF 3.6.9 on Windows XP.
评论 #1828005 未加载
评论 #1828006 未加载
mattermortelover 14 years ago
Isin't this extension great ? =D
freefire4629over 14 years ago
what version of firefox do you need to have to run it? i can't get it to work.
linharesover 14 years ago
please don't tell 4chan
评论 #1831814 未加载
评论 #1837794 未加载
drivebyacct2over 14 years ago
Interesting. I was going to do something similar but keep it limited to Facebook chat. That way you could eavesdrop on conversations in the room and impersonate people, etc. This is actually probably easy to program and more versatile at that.
AlexRodriguezover 14 years ago
Works for me.
bluesmoonover 14 years ago
Well, whatever... encrypt all you like, $5 will still crack your session: <a href="http://xkcd.com/538/" rel="nofollow">http://xkcd.com/538/</a>
评论 #1831398 未加载