Global Information Lookup Global Information

Firesheep information


Firesheep
Developer(s)Eric Butler
Stable release
0.1-1[1]
Repository
  • github.com/codebutler/firesheep Edit this at Wikidata
Operating systemMicrosoft Windows and Mac OS X (highly unstable on Linux)
Available inEnglish
TypeAdd-on (Mozilla)
Websitecodebutler.com/firesheep

Firesheep was an extension for the Firefox web browser that used a packet sniffer to intercept unencrypted session cookies from websites such as Facebook and Twitter. The plugin eavesdropped on Wi-Fi communications, listening for session cookies. When it detected a session cookie, the tool used this cookie to obtain the identity belonging to that session. The collected identities (victims) are displayed in a side bar in Firefox. By clicking on a victim's name, the victim's session is taken over by the attacker.[2]

The extension was released October 2010 as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons stated initially that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Since then, Firesheep has been removed from the Firefox addon store.

A similar tool called Faceniff was released for Android mobile phones.[5]

  1. ^ Butler, Eric. "Firesheep – codebutler". Retrieved December 20, 2010.
  2. ^ Steve Gibson, Gibson Research Corporation. "Security Now! Transcript of Episode No. 272". Grc.com. Retrieved November 2, 2010.
  3. ^ "Firesheep Sniffs Out Facebook and Other User Credentials on Wi-Fi Hotspots". Lifehacker. October 25, 2010. Retrieved October 28, 2010.
  4. ^ Keizer, Gregg (October 28, 2010). "Mozilla: No 'kill switch' for Firesheep add-on". Computer World. Retrieved October 29, 2010.
  5. ^ "Sniff and intercept web session profiles on Android". Help Net Security. June 2, 2011. Retrieved June 2, 2011.

and 6 Related for: Firesheep information

Request time (Page generated in 0.5285 seconds.)

Firesheep

Last Update:

Firesheep was an extension for the Firefox web browser that used a packet sniffer to intercept unencrypted session cookies from websites such as Facebook...

Word Count : 342

Session hijacking

Last Update:

session hijacking. In October 2010, a Mozilla Firefox extension called Firesheep was released, and it provided an easy access point for session hijackers...

Word Count : 1560

HTTP Strict Transport Security

Last Update:

cookie-based website login credentials stolen by widely available tools such as Firesheep. Because HSTS is time limited, it is sensitive to attacks involving shifting...

Word Count : 2411

Pcap

Last Update:

tool for monitoring network traffic and bandwidth usage in real time. Firesheep, a discontinued extension for the Firefox web browser that captured packets...

Word Count : 1498

Promiscuous mode

Last Update:

NetScout Sniffer Wireshark (formerly Ethereal) tcpdump OmniPeek Capsa ntop Firesheep Virtual machine VMware's VMnet bridging VirtualBox bridging mode Containers...

Word Count : 554

HTTPS Everywhere

Last Update:

2012, Eric Phetteplace described it as "perhaps the best response to Firesheep-style attacks available for any platform". In 2011, Vincent Toubiana and...

Word Count : 1293

PDF Search Engine © AllGlobal.net