lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <69e56bb50808110403n499e658fld6a4e7d074c5ebb9@mail.gmail.com> Date: Mon, 11 Aug 2008 13:03:01 +0200 From: "Sandro Gauci" <sandro@...blesecurity.com> To: "Full Disclosure" <full-disclosure@...ts.grok.org.uk> Subject: Surf Jack - HTTPS will not save you Say hello to a new security tool called "Surf Jack" which demonstrates a security flaw found in various public sites. The proof of concept tool allows testers to steal session cookies on HTTP and HTTPS sites that do not set the Cookie secure flag. Tool: http://surfjack.googlecode.com/ Short paper: http://resources.enablesecurity.com/resources/Surf%20Jacking.pdf Screencast: http://www.vimeo.com/1507697 This research was done independently from Mike Perry's[1], but it appears to be effectively the same thing. [1] https://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry -- Sandro Gauci EnableSecurity Web: http://enablesecurity.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/