With regards to my #sniff talk to BCSG6 on how one can steal data straight off the air and with arp based attacks in public networks, someone seems to have taken it one step further this time with cookie based attacks.
Details here:
http://codebutler.com/firesheep
It's getting easier and easier to exploit and sniff data that is "private" (to you at least) so please be careful when using public wifi spots. They are *NOT* trusted.
Mark
Theoretically speaking, yes, it should work. Even if you did not use Firesheep,
you could just fire up wireshark or airodump-ng and do the capturing and
extraction manually.
In fact, I believe that even the wireless@sg login page you get redirected to is
vulnerable to sslstrip, which we demonstrated using paypal as an example during
the #sniff talk at BarcampSG6.
--
Kind regards,
Chow Loong Jin
All firesheep does is to basically turn the above into a pretty fancy GUI which you can point click and press GO and you'll get the same results really. Come to think of it, might actually do a paper on how terribly insecure wireless@sg is, even with their "ssl" web vpn which really seems to be rubbish at first glance. Going to need new hashtag for this.
Kind regards,
Mark
Details here:
http://codebutler.com/firesheep
--
Chat: http://hackerspace.sg/chat
Wireless@SGx - 802.1x authentication and encryption for Wireless@SG
Max
> --
> Chat: http://hackerspace.sg/chat