Sunday 13 May 2012

How to protect against Firesheep attacks



How to protect against Firesheep attacks
Experts suggest defensive measures to ward off Firefox add-on's hijacking of Facebook, Twitter sessions via Wi-Fi
Computerworld - Security experts today suggested ways users can protect themselves against Firesheep, the new Firefox browser add-on that lets amateurs hijack users' access to Facebook, Twitter and other popular services.
Firesheep adds a sidebar to Mozilla's Firefox browser that shows when anyone on an open network -- such as a coffee shop's Wi-Fi network -- visits an insecure site.
A simple double-click gives a hacker instant access to logged-on sites ranging from Twitter and Facebook to bit.ly and Flickr.
Since researcher Eric Butler released Firesheep on Sunday, the add-on has been downloaded nearly 220,000 times.
"I was in a Peet's Coffee today, and someone was using Firesheep," said Andrew Storms, director of security operations at San Francisco-based nCircle Security. "There were only 10 people in there, and one was using it!"
But users aren't defenseless, Storms and several other experts maintained.
One way they can protect themselves against rogue Firesheep users, experts said on Tuesday, is to avoid public Wi-Fi networks that aren't encrypted and available only with a password.
However, Ian Gallagher, a senior security engineer with Security Innovation, argued that tosses out the baby with the bathwater. Gallagher is one of the two researchers who debuted Firesheep last weekend at a San Diego conference.
"While open Wi-Fi is the prime proving ground for Firesheep, it's not the problem," Gallagher said in a blog post earlier on Tuesday. "This isn't a vulnerability in Wi-Fi, it's the lack of security from the sites you're using."
Free, open Wi-Fi is not only taken for granted by many, but it's not the problem. There are plenty of low-risk activities one can do on the Internet at a public hotspot, including reading news or looking up the address of a nearby eatery.
So if Wi-Fi stays, what's a user to do?
The best defense, said Chet Wisniewski, a senior security adviser at antivirus vendor Sophos, is to use a VPN (virtual private network) when connecting to public Wi-Fi networks at an airport or coffee shop, for example.
While many business workers use a VPN to connect to their office network while they're on the road, consumers typically lack that secure "tunnel" to the Internet.
"But there are some VPN services that you can subscribe to for $5 to $10 month that will prevent someone running Firesheep from 'sidejacking' your sessions," Wisniewski said.
A VPN encrypts all traffic between a computer -- a laptop at the airport gate, for instance -- and the Internet in general, including the sites vulnerable to Firesheep hijacking. "It's as good a solution as there is," Wisniewski said, "and no different, really, than using encrypted Wi-Fi."
One provider, Strong VPN, prices its service starting at $7 per month or $55 per year.
Gallagher, however, warned that a VPN isn't a total solution. "That's just pushing the problem to that VPN or SSH endpoint," he said. "Your traffic will then leave that server just as it would when it was leaving your laptop, so anyone running Firesheep or other tools could access your data in the same way."
"A blind suggestion of 'use a VPN' doesn't really solve the problem and may just provide a false sense of security," he said.
Strong VPN disagreed. "Our servers are in a secure datacenter, so no one's going to be able to 'sniff' the traffic coming in or going out," a company spokesman countered. "All the traffic from, for example, your laptop in San Francisco, is encrypted when it goes to one of our U.S. servers."
Storms echoed Strong VPN's assertion. "I can see [Gallagher's point], that a VPN doesn't solve the root problem, which is on the service end," he said. "But although it's true that the traffic would be clear text when it leaves the VPN server for the site, it's very unlikely that someone would snoop that traffic."
Sean Sullivan, a security advisor with F-Secure, recommended Comodo'sTrustConnect as "a VPN in all but name only." Comodo, a rival of F-Secure, sells the service for $7 per month or $50 annually.
If free is the object, there are options there, too, said Wisniewski, Sullivan and Gallagher, who pointed to a pair of free Firefox add-ons that force the browser to use an encrypted connection when it accesses certain sites.
One of those Firefox add-ons, HTTPS-Everywhere, provided by the Electronic Frontier Foundation (EFF), only works with a defined list of sites, including Twitter, Facebook, PayPal and Google's search engine.
The other choice, Force-TLS, serves the same purpose as the EFF's extension, but lets users specify which sites on which to enforce encryption.


However, other browsers, such as Microsoft's Internet Explorer and Google's Chrome, lack similar add-ons, leaving their users out in the cold.
"I expect that [Firesheep] will spur the EFF or others, maybe in the open source community, to some additional development [of such add-ons], maybe Chrome ports of those extensions," Sullivan said.
That could take months. In the meantime, Sullivan had another idea. "A MiFi device can encrypt [traffic], so with one you're always carrying your own Wi-Fi hotspot with you," he said.
MiFi isn't cheap, however. Verizon, for example, gives away the hardware but charges between $40 and $60 per month for the access to its 3G network.
Ultimately, moves users make to plug the holes Firesheep exposes are stop-gaps. The elephant in the room, said Butler and Gallagher as they defended the release of the add-on, is the lack of full encryption. And only the sites and services can fix that.
"The real story here is not the success of Firesheep but the fact that something like it is even possible," Butler wrote in his blog on Tuesday. "Going forward, the metric of Firesheep's success will quickly change from amount of attention it gains, to the number of sites that adopt proper security. True success will be when Firesheep no longer works at all."
But for the moment, even security professionals are worried. "I'm at the airport right now," Wisniewski told Computerworld. "And I'm wondering if someone is using Firesheep here. Maybe I should do a little 'shoulder browsing' to see if anyone has it running."

Tuesday 8 May 2012

Firesheep


Hello!!  Long time since I last updated my blog~~~~~
so i decided to add something sifferent this time~ 
Well, take this guys! :DD
We all know about cyber crime and how such acts can affect our lives, so the first thing to do before we can counter such attacks is to understand them. The article below is a brief description about "Firesheep", so lets read~~~~ :)

Firesheep is an extension developed by Eric Butler for the Firefox web browser. The extension uses a packet sniffer to intercept unencrypted cookies from certain websites (such as Facebook and Twitter) as the cookies are transmitted over networks, exploiting session hijacking vulnerabilities. It shows the discovered identities on a sidebar displayed in the browser, and allows the user to instantly take on the log-in credentials of the user by double-clicking on the victim's name.

The extension was created as a demonstration of the security risk to users of web sites that only encrypt the login process and not the cookie(s)created during the login process. It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).

Later a similar tool called Faceniff was released for Android mobile phones.

As for us in UTM, many uses Wi-Fi for online purposes. But how safe are we against such attacks?

Wireless network security

Local Wi-Fi networks may be configured with varying levels of security enabled. Using a Wired Equivalent Privacy (WEP) password, the attacker running Firesheep must have the password, but once this has been achieved (a likely scenario if a coffee shop is asking all users for the same basic password) they are able to decrypt the cookies and continue their attack. However, using Wi-Fi Protected Access (WPA) encryption offers individual user isolation, preventing the attacker from decrypting any cookies sent over the network even if they have logged into the network using the same password. An attacker would be able to manually retrieve and decrypt another user's data on a WPA-PSK connection, if the key is known.




Well, that's all for now! Hope this post gave you guys some info. 
See you again very soon! xDD

Wednesday 2 May 2012

Cabling


Cable is the medium through which information usually moves
from one network device to another. Several types of cable are
commonly used with LANs.In some cases,a network will utilize only one type of cable, other networks will use a variety of cable types.There are four types of cables namely :

  1.      Unshielded Twiested Pair (UTP) 
  2.      Shielded Twisted Pair (STP) 
  3.      Coaxial Cable
  4.      Fiber Optic Cable
  5.      Wireless LANs

      Unshielded Twiested Pair  (UTP)


  •   four pairs of wires inside the jacket
  •    each pair is twisted with different twist per   inch to help eliminate  interference from adjacent pairs and other electrical devices.










 Shielded Twisted Pair (STP) 




  •  consists of two individual wires wrapped in a foil shielding to help provide a more reliable data communication. 
  • suitable for environments with electrical interference but the extra shielding can make the cables quite bulky. 
  • often used on networks using Token Ring topology.
Coaxial Cable





  • Coaxial cabling has a single copper conductor at its center. 
  • A plastic layer provides insulation between the center conductor and a braided metal shield. 
  • The metal shield helps to block any outside interference from fluorescent lights, motors, and    other computers.
  • The most common type of connector   used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector. 




  • Fiber Optic Cable  consists of a center glass core surrounded by several layers of protective materials and transmits light rather than electronic signals eliminating the problem of electrical interference. 
  • Fiber Optic Cable is ideal for certain environments that contain a large amount of electrical interference. 
  • It is able to transmit signals over much longer distances than coaxial and twisted pair.



Summary of Ethernet cabling 

10BaseT : Unshielded Twisted Pair : 100 meters
10Base2 : Thin Coaxial : 185 meters
10Base5 : Thick Coaxial : 500 meters

10BaseF : Fiber Optic : 2000 meters'