La lesson à retenir est que lorsqu’on utilise des applications web vulnérables qui n’utilisent pas https et qui utilisent des témoins de session (Facebook, Twitter…), on se doit d’utiliser les précautions suivantes:
- Utiliser l’alternative HTTPS lorsque possible (ex: https://www.amazon.ca, https://www.facebook.com)
- Bien quitter sa session en utilisant la fonction sign-out (pour rendre désuet le témoin de session)
- Éviter d’utiliser une connexion wi-fi sans chiffrage lorsqu’on accède à ces services
Firesheep is a POC firefox plugin that makes sniffing session cookies of vulnerable apps (way too) easy. This basically lets anybody bypass authentication to your account through session hijacking. Here’s a description on Wikipedia.
The lesson here is for these potentially vulnerable apps that don’t encrypt the whole session (via https) and use session cookies (Facebook, Twitter…), people should:
I took a few minutes to try this plugin out (in a VM) and I can tell you that it works well with at least the Facebook and Cisco sites.
- Try using the HTTPS alternative when possible (eg: https://www.amazon.ca, https://www.facebook.com)
- Sign-out when done with a web service (to obsolete the session cookie)
- Avoid using unencrypted wifi when accessing unencrypted web services
No comments:
Post a Comment