Pages

Wednesday, May 18, 2011

Firesheep, Sidejacking Made Easy

   Toorcon, a network and computer security conference, was just last weekend.  Over the past few days, the internet has gone crazy over a new firefox extension, Firesheep, that was unveiled there.  You wont be able to find Firesheep where you typically get all of your firefox extensions, but you can download it on the authors website at http://codebutler.github.com/firesheep/


   So why has this extension taken over the internet by storm?  And by storm, I mean over 120,000 downloads, and news stories about this tool on every news website I typically visit.  Firesheep is a one click, simple (except for some windows users) way to hijack someone’s facebook, twitter, etc.  If your on a local wifi, you’re probably susceptible to getting your accounts broken into.  This is because most local wifis are unencrypted or at least running WEP (which is also susceptible).


   What is sidejacking?  Sidejacking is a technique used to gain access to a victims online account without needing to find their username or password.  This is made possible by grabbing a users cookie.  You have probably heard or seen cookies when cleaning them out in your browser.  A cookie is what keeps your signed in to your account.  Without it, you would have to keep logging in everytime you visited a different webpage.  Cookies are also used with the shopping carts seen on websites; that’s how it remembers what you ordered.  So cookies are very useful in the online world.  The main problem is that most sites don’t encrypt them.  A website, like facebook, will encrypt your login information but will send you the cookie unencrypted.  Over a wireless network, it’s just simple prey floating through the air, just waiting for another attacker like firesheep to grab it.


PhotobucketThe picture to the right is firesheep in action.  Firesheep sits in the bar at the left, and sniffs port 80 (unless otherwise specified) for all of those yummy cookies.  As it finds them, it lists the victims name, pic, and what website they’re on.  You can double click one of the listed sites, and the session will appear in the window to the right, already open and logged in.


  Google is safe, somewhat, against this type off attack.  They have actually deployed SSL for everything on their site as of last December.  I myself have always been told that running SSL on everything is a complete waste and takes way to much computing power.  Google has stated that they only see a 2% increase in CPU usage and feel that everyone should move to using SSL on everything and not just the login.  For smaller companies with one server, this is hard, but for big companies like Facebook, Twitter, and Hotmail…. you need to pick up the slack!


Photobucket   Pictured to the left is the preferences menu inside of Firesheep.  You need to specify which device to do the sniffing on.  I had some problems myself with the wireless sniffing, mainly due to windows.  Your card needs to be put into a passive mode in order to sniff packets.  In windows, this is a pain in the butt to do.  You have to have winPcap downloaded, but sometimes that doesn’t solve the problem for you.  I’m waiting for the linux one myself, so I can load this up into Ubuntu.  At least there, it’s possible to put my card into the passive mode.


If you want to read more on Firesheep, check out the authors website here


Again, you can download it on his website here


You can also download winPcap here


   If you’re interested in sidejacking in general.  There is another cool tool called Hamster and Ferret.  It’s a little more complicated than Firesheep, and requires man in the middle, but it’s another tool to try out.

Bri's Birthday

Photobucket


   My sis’s (pictured far left) birthday was this last Tuesday, so my family held a get together today to celebrate it.  It’s been a long time (mom’s FB states 7 years) since we’ve had everyone under the same roof at the same time.  Everyone is so busy that no one’s schedule ever matches.  Crystal, who’s laying across everyone, is typically busy with her family.  We got to see who two sons today who are getting very big.  Lauren goes to college in Sacramento and has little time between work and school.  Amanda on the far right is stationed in Texas.  She’s currently on leave visiting the family and just came out yesterday.


   I have two other siblings who aren’t pictured, Kaylie and Nathan.  I think at this time they were hid away in their rooms.

What Were These Girls Smoking

Sushi Etiquette



Damn, I’m guilty on a couple of these. Guess I need to go to the sushi bar to improve on my etiquette!

Tuesday, March 16, 2010

Cal HW #10


Hitler Meets Server 03



This is a video that was made by a classmate in my windows server security class. We had difficulty at the beginning of class getting our hands on server 03 to go along with our book. Microsoft had stopped supporting 03 and shifted all support to 08. That's all fine, except that our book is specifically tailored to 03. In the end we got installations of 03 on our machines.. so this video is Hitlers response to that fact.