Free Hack Tools
October 2008
Free tool hacks banking, webmail, and social networking sessions. A researcher will demonstrate a free, plug-and-play hacking tool this week that automatically generates man-in-the middle attacks on online banking, Gmail, Facebook , LiveJournal, and LinkedIn sessions – even though they secure the login process. The researcher, who recently released the so-called “Middler” open-source tool, will show it off at the SecTor conference in Toronto. Aside from the unnerving capability of hacking into sites that perform secure logins and then use clear-text HTTP, Middler is also designed for use by an attacker with no Web-hacking skills or experience. ”The Middler allows an attacker with no Web application-hacking experience to launch attacks that previously required substantial time and skill,” according to the Middler Web page. The Middler basically clones the victim’s online session by using the same cookies and HTML form parameters as the victim. Then the attacker can inject malicious java_script onto the Web pages, redirect the user to another page, or log the victim’s session.
Free tool hacks banking, webmail, and social networking sessions. A researcher will demonstrate a free, plug-and-play hacking tool this week that automatically generates man-in-the middle attacks on online banking, Gmail, Facebook , LiveJournal, and LinkedIn sessions – even though they secure the login process. The researcher, who recently released the so-called “Middler” open-source tool, will show it off at the SecTor conference in Toronto. Aside from the unnerving capability of hacking into sites that perform secure logins and then use clear-text HTTP, Middler is also designed for use by an attacker with no Web-hacking skills or experience. ”The Middler allows an attacker with no Web application-hacking experience to launch attacks that previously required substantial time and skill,” according to the Middler Web page. The Middler basically clones the victim’s online session by using the same cookies and HTML form parameters as the victim. Then the attacker can inject malicious java_script onto the Web pages, redirect the user to another page, or log the victim’s session.