Firefox: Firesheep sniffs out and steals cookies—and the account and identity of the owner within the process—of well-liked websites (like Facebook and Twitter) from the browsing sessions of alternative users on the Wi-Fi hotspot you are hooked up to.
Firesheep could be a proof-of-concept Firefox extension created by Eric manservant to point out however leaky the protection several well-liked websites (like Facebook, Flickr, Amazon.com, Dropbox, Evernote, and more) use is. the matter, as Firesheep shockingly demonstrates, is that several websites solely inscribe your login. Once you’re logged in they use Associate in Nursing unsecured reference to an easy cookie check. Anyone from your science address (that of the Wi-Fi hotspot) thereupon cookie may be you. once victimization Firesheep on a public hot spot any session it will intercept is displayed within the Firesheep pane with the user’s name and photograph (when available). merely click on their name to intercept the session and begin browsing the web site as if you’re them.
What are you able to do to shield yourself against such a painfully simple attack against your privacy Associate in Nursingd security? you’ll started an SSH SOCKS proxy to inscribe your traffic, effectively causing your web site sessions and attendant cookies through a sniff-proof tunnel. For a less concerned various, however, you’ll use one thing just like the antecedently mentioned HTTPS everyplace Firefox extension or Force-TLS (highlighted by TechCrunch). basically, these extensions can force well-liked sites to send information via the safer HTTPS protocol, that encrypts information as it’s sent, and whereas it’s slightly slower, it’s positively price victimization HTTPS once obtainable