Internet is great, and everyday millions of people spend their day surfing it, using Google, Gmail, Youtube, Twitter, Facebook, etc. Some people buy at ebay, or Amazon. Even some people use it to work, though these cases maybe not that common 😉
As a reader of this blog, you are concerned about security and therefore you already know that connecting through public WiFi is a risky sport. But it is also really convenient, how many of you have done it in McDonalds,Starbucks, etc.? Yeah, me too 🙂
As we always say, anyone could be sniffing the traffic and capture the data. There are even some websites that send the password in plain text! Yes, incredible but true. Anyway, that’s not the way of working of the main websites, as the ones I mentioned earlier. As we use to spend a lot of time in these webs (how many hours do you spend on Facebook per day?) in order to keep us logged in, once we validate ourselves a cookie is created with our session information, so we don’t have to enter our credentials over and over again.
Do you imagine what would happen if these cookies were sent in plain text, so anyone could capture them? Yes, that would be a nightmare, anyone could capture them and recreate them in their computers and steal our session. Well, this is something that happens ALL THE TIME. And it is no new. But yet, to perform this operation the guy must be smart enough to sniff the traffic, and work with it in order to steal your cookie. Not hard, but not everyone could do it.
Now the bad news; it’s been made available a Firefox add-on you can install that will do everything for you: sniff the traffic, gather the cookies around and show you the different ‘stolen’ cookies, so you only have to click on them to steal the session. Easy, isn’t it? Even Netkairo, the Mariposa guy, would be able to do such thing.
This has been shown in Toorcon last weekend by Ian Gallager and Eric Butler, in a talk called “Hey Web 2.0: Start protecting user privacy instead of pretending to“. The slides can be found here.
A screenshot od the add-on working, with stolen sessions from Google, Facebook, Twitter and Flickr:
Don’t panic. Yes, this is bad, but there are some countermeasures to take. The best solution would be to use SSL encryption in all communications, but this has to be supported in the server side, so that won’t be happening (at least massively) anytime soon. Meanwhile, you should use HTTPS Everywhere, which will force to use https when connecting to some mayor websites, such as Twitter or Facebook:
I installed it since it went public and it is always on.
But the best solution right now if you are connecting through an open WiFi, is using a VPN. If you cannot, at least use the HTTPS Everywhere.
Good post. HTTPS-everywhere is a great tool, but if you want to add websites yourself to force https on, try Force-TLS: