Attacks/Breaches
11/9/2010
01:58 PM
50%
50%

Tools Gut Firesheep Cookie Hijacking Attack

BlackSheep, FireShepherd, and HTTPS Everywhere released to block controversial Firefox plug-in.

How Firesheep Can Hijack Web Sessions
(click image for larger view)
Slideshow: How Firesheep Can Hijack Web Sessions

Scared by the recent arrival of Firesheep, a controversial plug-in for Firefox that allows attackers to hijack your web sessions? The cookie-stealing tool, downloaded at least 600,000 times to date, works against users of a number of Web 2.0 websites, including Facebook, Twitter, and Flickr.

Now, however, free tools are appearing to help users defend themselves.

On Monday, SaaS security firm Zscaler released BlackSheep, a free Firesheep countermeasure. (As with Firesheep, Windows users must first install Winpcap.) BlackSheep works by making HTTP requests using fake variables to the websites watched by Firesheep. BlackSheep then detects and blocks Firesheep clients at work on the local network when they attempt to reuse the fake variables.

Meanwhile, Gunnar Atli Sigurdsson, a 21-year-old engineering students at the University of Iceland, released FireShepherd for Windows, "a small console program that floods the nearby wireless network with packets designed to turn off Firesheep." The tool has the added benefit of blocking Firesheep for anyone else using the same Wi-Fi connection.

Another workaround is HTTPS Everywhere, from the Tor Project and Electronic Freedom Foundation, which forces websites to SSL-encrypt every page. The only caveat is that websites must offer HTTPS.

Countermeasures aside, controversy continues to rage over whether Firesheep itself is good or bad. The goal of releasing it, according to its creator, Eric Butler, was to expose the lack of security inherent to using unencrypted Wi-Fi networks.

"Facebook is constantly rolling out new 'privacy' features in an endless attempt to quell the screams of unhappy users, but what's the point when someone can just take over an account entirely?" said Butler. Indeed, the necessary packet-sniffing tools, including free utilities such as NetStumbler and Kismet, have been available for years -- and Firesheep blockers won't even detect them.

Accordingly is it "mission accomplished" for publicizing Wi-Fi insecurity? "People have been living under the impression that capturing a session by stealing a cookie can only be done by skilled hackers with special tools. This has now changed," said F-Secure's chief research officer, Mikko Hypponen.

"What can users do right now? Force SSL on if you can. Don't use Wi-Fis without encryption. Or, use a VPN," said Hypponen. "If you have a VPN, always turn it on when you are on a hotspot, even if you're not 'working' but just surfing Facebook. All good VPN products will encrypt all of the traffic, even to Facebook."

Why not simply SSL-enable for Facebook, Twitter, and everything else under the sun? Many sites do use SSL, but only for encrypting logon information. With the exception of Gmail, few use SSL for the entire session.

Previously, using SSL took a bite out of performance. But today, said Google software engineer Adam Langley, "SSL/TLS is not computationally expensive anymore." In other words, "you too can afford to enable HTTPS for your users."

According to statements made by Facebook and Twitter, they're working on it.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.