Reconsidering The Side-jacking Attack
Not that long time ago, I've made some comments on Robet Graham's side-jacking attack. Clearly, my reasoning was based upon the his PowerPoint slides but not his BlackHat presentation, where he is more then clear about the motivation behind his work. I've become part of the senseless bashing masses, which are currently haunting the hacker circles. Therefore, I would like to make things right once and for all on this particular topic.
Although Robert's research comes down to sniffing the air and extracting cookies from unencrypted HTTP session, which is not in particular new, I consider his work very innovative, simple but very powerful. He clearly improved upon an area which no one was looking at the time of his presentation and he made a serious impact on the overall user awareness. The most interesting part of the side-jacking attack is not the concepts that it involves but the types of tools it makes use of. I can see that Robert is very clear about that, after previewing his BlackHat talk. The Hamster and Ferret tools have introduced a new era of tool design many future project will probably incorporate. Simply put, these tools make the process easier and this is quite important in many, many ways.
My judgment was based upon entirely on what I would like to refer to as the new factor. We, as a community, are keen to appreciate innovation but fail to see when it is not obvious. This statement may sound controversial but it is not far from the truth. Bugs are discovered on a daily basis but yet we are most interested to read about them rather then look for the small changes that make big impacts. I hope that we change this type of thinking one day and embrace a bit more of the creative spirit, the spirit that is not restricted by any boundaries, false believes and mostly prejudice.
Open your eyes and clear your mind.
Archived Comments
proxy + sniffer + packet content analyzer
- something that was not available before that. Ferret and Hamster is for sniffing like Metasploit for exploits. It is innovation, because the next generation of hacker sniffing tools will concentrate on getting the most of the captured data without wasting too much time. And yes, it is an innovation! But in order to prove that I've picked the right words, let me quote how innovation is defined by several sources:
- A creation (a new device or process) resulting from study and experimentation.
- Introduction of a new idea into the marketplace in the form of a new product or service, or an improvement in organization or process.
- The use of a new technology, item, or process to change what goods and services are provided, the way they are produced, or the way they are distributed.
- The creation, development and implementation of a new product, process or service, with the aim of improving efficiency, effectiveness or competitive advantage. Innovation may apply to products, services, manufacturing processes, managerial processes or the design of an organization.
- etc...