Please create an account to participate in the Slashdot moderation system


Forgot your password?
Security Encryption Firefox Privacy Social Networks Software Wireless Networking News

Firefox Extension Makes Social-Network ID Spoofing Trivial 185

Orome1 writes "A simple-to-use Firefox plugin presented yesterday at Toorcon in San Diego has hit the security world with the realization that squabbles about Facebook's changing privacy settings and various privacy breaches simply miss the point. 'When it comes to user privacy, SSL is the elephant in the room,' said Eric Butler, the developer of the extension in question, dubbed Firesheep. By installing and running it, anyone can 'sniff out' the unencrypted HTTP sessions currently allowing users on that network segment to access social networks, online services and other website requiring a login, and simply hijack them and impersonate the user."
This discussion has been archived. No new comments can be posted.

Firefox Extension Makes Social-Network ID Spoofing Trivial

Comments Filter:
  • Why no encryption? (Score:4, Interesting)

    by AHuxley ( 892839 ) on Monday October 25, 2010 @08:19AM (#34010626) Journal
    What is the cpu use and heat of the user base requesting and using ssl vs this bad news?
    "Double-click on someone, and you're instantly logged in as them."
    Whats the the extra use 15-20%? vs unencrypted HTTP.
    Would ssl been left off allow creative law enforcement uses?
  • by SpinningCone ( 1278698 ) on Monday October 25, 2010 @08:38AM (#34010708)

    I used to do sniffing and stuff like this a couple years ago and the biggest hurdle was finding a wireless adapter which would allow promiscuous mode. aircrack sells one that comes with 1st party drivers to allow sniffing. I used a linksys usb adapter since there were 3rd party drivers that allowed it.

    unless something has changed I thought most wireless driver didn't support promiscuous mode for sniffing.

  • How does it work? (Score:3, Interesting)

    by pinkeen ( 1804300 ) on Monday October 25, 2010 @08:39AM (#34010712) Homepage
    The article is extremely light on details. The plugin's page [] doesn't tell much either. I'm curious how does it capture the WIFI packets. Is it possible to capture them when not in monitor mode?
  • by Viol8 ( 599362 ) on Monday October 25, 2010 @08:46AM (#34010766) Homepage

    ... that the bleating masses who so readily rushed to put their entire lives and details on social networking sites despite all the warnings are now running around shouting at all the chickens that are coming home to roost?

    For the rest of us with some common sense this is just hilarious.

  • by Anonymous Coward on Monday October 25, 2010 @09:10AM (#34010974)

    Post your user/pass if it doesn't matter. Put your action where your mouth/fingers is/are.

  • But will it... (Score:2, Interesting)

    by koterica ( 981373 ) on Monday October 25, 2010 @09:20AM (#34011110) Journal
    run (on) linux? Apparently not. I guess I wont be using it.
  • by FrostDust ( 1009075 ) on Monday October 25, 2010 @09:38AM (#34011280)

    Do they have any guarantee that all of their users have a browser that supports HTTPS?

    To Facebook, it's better to allow access to as many users as possible, than lock some out in the name of security.

  • by Instant_Karmma ( 1730260 ) on Monday October 25, 2010 @09:42AM (#34011314)
    This works on any network segment, including wired. How many people do you know that use Facebook, Amazon, etc. from their desks? Sure, your traffic could always be monitored by the PFY's in the data center, but now your pointy-haired boss has a tool that allows him to see what you've been buying. No thanks.
  • Re:https everywhere (Score:5, Interesting)

    by anti-pop-frustration ( 814358 ) on Monday October 25, 2010 @10:19AM (#34011722) Journal
    https everywhere [] is indeed a great extension, and everybody should be using it.

    But some of the services that Firesheep target don't offer an https option *at all*. This is no rebuttal, it only proves Firesheep developer's point : these services have an unappropriate level of security.

    The worst offender is probably Yahoo! Mail. They don't even offer https to their paying customers! For one of the leading webmail service this is utterly unacceptable. https for login is a fig leaf, the only thing this does is give users a false sense of security.
  • KB SSL Enforcer (Score:3, Interesting)

    by brunes69 ( 86786 ) <> on Monday October 25, 2010 @10:57AM (#34012332) Homepage

    This is why I use this Chrome extension - []

    Basically for any site you go to it AUTOMATICALLY redirects you to the SSL version of that site if it exists. Including

    Yes should be the default, as should most sites, but until they are this extension is invaluable IMO.

  • eBay Gaming (Score:1, Interesting)

    by Anonymous Coward on Monday October 25, 2010 @11:22AM (#34012726)
    I get so irritated with the gaming of eBay's system. It wasn't until I put up a nice guitar that I learned if you want to get a good deal on something, bid as a brand-new user. What was happening was some brand-new user was bidding on my auction in the smallest increments allowed. This made it look like the auction was being bid up by me, so probably a lot of eBay regulars didn't want to bid because of this douche. I didn't really notice or understand what was happening until the douche won the auction at a price that was hundreds below where the guitar should have sold. And I'm too effing moral to do the other eBay game I hate which is when a seller cancels an auction simply because the price is too low. I've had that happen on a number of occasions where it was very clear I was going to get a sweet deal on an auction and seller suddenly cancels. Of course, you place a bid and there's no fucking way to get out of it without getting permission from the seller, but if you're a seller you can get out of the auction any damn time you please.
  • Re:How does it work? (Score:3, Interesting)

    by pinkeen ( 1804300 ) on Monday October 25, 2010 @08:07PM (#34019660) Homepage
    That wasn't my question. When in monitor (promiscous) mode, adapter can capture but cannot associate and give you internet connection. So, when you capture packets you need another wlan adapter or ethernet nic for your internet conncetion to actually use this stolen cookies. There's no mention of it on the site. So I wondered that maybe the plugin does some magic and captures packets while the same adapter is associated with an ap.

"The way of the world is to praise dead saints and prosecute live ones." -- Nathaniel Howe