The use of the hamster hijacking Gmail(sidejacking)-vulnerability warning-the black bar safety net

2009-01-13T00:00:00
ID MYHACK58:62200921921
Type myhack58
Reporter 佚名
Modified 2009-01-13T00:00:00

Description

4 month released, the software DESCRIPTION is tempting: "The black hat of the General Assembly after the outgoing of a tool to Ferret it. The author claims that you can use him to intercept mail login process the cookie information. Then you can feel free to invade the others mailbox. Worked at the black hat conference currently field demo how to hack Gmail, Hotmail and other mailboxes. Until finally the author put the code and tools are issued to. Absolutely rod, the author of the code knowledge is very high."

Huh, quite tempting bar, with the link point in the past down under found is the Ferret, a Sniffer.

This is the tools screenshot:

!

If the individual relying on this tool can be used to capture, but to say that to hack Gmail Yahoo Hotmail and other mailboxes, or have a certain misunderstanding.

First of all Robert Graham at the time was mainly made cookies the importance of security, because in the 0 to 7 years of the black hat hacker conference, the site of the application is a Wi-Fi network. And he uses an own developed tool called"Hamster", with the Ferret tool to grab the radio network of the packet, In grip to the other person logs in to Gmail or other mailbox cookie, with a Hamster handy for cookie spoofing. This attack method is the author called"sidejacking" is.

In fact, with Firefox cookie edit components, or based on IE kernel Maxthon cookie Editer can modify the cookie to deceive. Say a whole lot, in short, with the Hamster still convenient too much is too much, click on the easy hijacking.

Download the latest version of Hamster, the 下载 的 工具 包 中 包含 了 hamster.exe 和 最新 版本 的 ferret.exe Okay, let's test it out. 【Download】to download the hamster: based on the wireless network through the ferret capture realized on the Gmail mailbox of the hijacked(sidejacking)

Insert instructions: use the tool before, be sure to install the Winpcap driver, otherwise it cannot run. [Download] WinPcap 4.0.2 the latest stable version, a powerful network driver

I am looking for good friends areone and I are on the same Wi-Fi network, then I enter the command line interface.

1, The first to configure the ferret, the selection of which pieces of card capture 运行 ferret.exe -W

!

The-W parameter looks like the help inside is not written out, this is used to identify the I with the card number. As shown above, my wireless card number is 2.

2, run the ferret capture start capture 运行 ferret.exe -i 2

!

See the characters tumbling out of it: start packet capture.

3, run hamster Very simple, command-line run directly to or directly double-click

!

4, Open the browser, enter the proxy server settings, add the proxy server 127.0.0.1:3 1 2 8

!

5, in the browser enter http://hamster Appear to the Management Interface. My internal network address is 1 9 2. 1 6 8. 0. 1 0 2 areone including the network the address is 1 9 2. 1 6 8. 0. 1 0 0 This time areone in his computer to log on to gmail. Soon, I here there tips.

!

6, The hijacking of I directly click on the http://hamster links on the page, and then click on the list on the left side in gmail Automatically pop up the new window, and start the hijacking.

!

Wait for a while, areone of the gmail user interface have appeared, I can already see his mail. Here, the seizure is completed.

This is a typical wireless network hijacking case presentation

Download related software:

【Download】to download the hamster: based on the wireless network through the ferret capture realized on the Gmail mailbox of the hijacked(sidejacking) [Download] WinPcap 4.0.2 the latest stable version, a powerful network driver

Simple backtracking steps of:

1, Download and install Winpcap 2, The package file release to a directory, the command-line mode to the directory 3, the ferret.exe the-W parameter to select which block the card for sniffing 4, the ferret.exe -i-card number to start sniffing 5, the 启动 hamster.exe 6, in browser, set proxy server address as 127.0.0.1:3 1 2 8 7, with browser access http://hamster 8, the refresh the after caught the content, click on it immediately hijacked.