You can find our previous post regarding HowTo use Firesheep on linux.
FireSheep is a small firefox extension that does big jobs for you e.g http sessions hijacking
What is FireSheep Extended?
This release is focused on Google search. If you are using Google Search services using a unsecured Wifi network, you searches are visible to MITM guys.
How it work?
When you are logged in on gmail.com and use google searches, Google’s sid cookie is easily captured through FireSheep. As soon you see sid cookie click on it and see visited links by victim.
How to be safe from FireSheep extended release?
Don’t use Google search while you are logged in on gmail.com on unsecured WiFi Networks.
What do you suggest for mitigation ? Share your thought in comments
What is FireSheep ?
Come on damn.. Its not new! Its an old firefox addon. I am explaining it here for how can you use or install it on Linux.
Lets start ;
Taking Checkout from the repository :
git clone https://github.com/codebutler/firesheep.git
Initialized empty Git repository in /root/firesheep/.git/
remote: Counting objects: 1020, done.
remote: Compressing objects: 100% (605/605), done.
remote: Total 1020 (delta 589), reused 770 (delta 402)
Receiving objects: 100% (1020/1020), 5.48 MiB | 123 KiB/s, done.
Resolving deltas: 100% (589/589), done.
git submodule update --init
Output :Submodule ‘backend/deps/http-parser’ (git://github.com/ry/http-parser.git) registered for path ‘backend/deps/http-parser’
Initialized empty Git repository in /root/firesheep/backend/deps/http-parser/.git/
remote: Counting objects: 815, done.
remote: Compressing objects: 100% (328/328), done.
remote: Total 815 (delta 549), reused 735 (delta 483)
Receiving objects: 100% (815/815), 185.18 KiB | 95 KiB/s, done.
Resolving deltas: 100% (549/549), done.
Submodule path ‘backend/deps/http-parser’: checked out ’459507f534c807d8ba741730fbc36d4b93b133c1′
apt-get install libpcap-dev xulrunner-1.9.2-dev libboost-all-dev libtool libhal-dev autoconf
How to Load it into Firefox?