Week
Five ↓
Most websites use Secure Socket Layer(SSL)
encryption (indicated by ‘https://’) when a user submits login credentials, but
subsequent data exchanges are not encrypted (Krebs, 2010). These websites use
cookies to identify sessions and these cookies are sent unencrypted with post-login
data. Once these cookies are intercepted by an eavesdropper during sniffing, and
the contents are known, a bogus HTTP request can then be created using this
cookie; to access a victim’s account. Eric Butler in 2010 released a tool
called “Firesheep” that allows “hackers to eavesdrop on unencrypted wireless
networks and steal the sessions of other users who are logged on to popular
websites” (Mike, 2011). With this Firefox extension, a malicious user can gain
access to different sessions. Firesheep is available on all Operating systems.
countermeasures
“The most effective solution to this is end-to-end
encryption, known on the web as HTTPS or SSL” (Krebs, 2010). Two of the most
widely used Firefox add-ons that provide encryption while surfing using public
networks are presented. They force specific websites to encrypt all traffic (including
post-login traffic) (Krebs, 2010).
- HTTPS Everywhere. “This extension encrypts communication with a number of major websites by default” (Mohit, 2010). It also allows users to add other sites to the “HTTPS” list.
- Force-TLS. This add-on does not come with any websites listed, but allows you to add new websites to its list.
Also, tunneling your
connections through a VPN will provide encryption and make your
communication obfuscated to eavesdroppers (Mike, 2011).
References
Krebs Brian. (October, 2010). Firesheep:
Baaaaad News for the Unwary’ Released.
Retrieved from https://krebsonsecurity.com/2010/10/firesheep-baaaaad-news-for-the-unwary/
Mohit Kumar. (November, 2010). HTTPS
Everywhere: Another tool to protect from Firesheep. Retrieved from https://thehackernews.com/2010/12/https-everywhere-another-tool-to.html
Mike Chapple. (February, 2011). Firesheep,
Fireshepherd, and Facebook: Understanding Session Hijacking. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1680707&seqNum=2
Video Credit: Daniel Taschik. November 14,
2012
No comments:
Post a Comment