Google Web History Vulnerable to Firesheep Hack | PCWorld

Created: 2012-07-24 07:34 Updated: 2012-07-24 07:34 Source: http://www.pcworld.com/article/239826/google_web_history_vulnerable_to_fireshee… Notebook: Notebook Stack/Web History of AZ

Google Web History Vulnerable to Firesheep Hack

By John E Dunn, Techworld.com    Sep 10, 2011 11:19 am

Two researchers have shown how a modded version of the Firesheep Wi-Fi sniffing tool can be used to access most of a victim's Google Web History, a record of everything an individual has searched for.

alt

The core weakness discovered by the proof-of-concept attack devised by Vincent Toubiana and Vincent Verdot lies with what is called a Session ID (SID) cookie, used to identify a user to each service they access while logged in to one of Google's services.

Every time the user accesses an application, the same SID cookie is sent in the clear, which the Firesheep captures from the data sent to and from a PC connected to a non-encrypted public Wi-Fi hotspot. (See also "Secure Your PC and Website From Firesheep Session Hijacking.")

Because many of Google's services use HTTPS (Gmail for instance), the attacker has to find a way to get the user to resend this SID. The most direct method is to set up a rogue access point and then use an iFrame to direct the user to a Google service (such as Alerts) that doesn't use an encrypted channel.

The attack also requires that the user has Google Web History tracking turned on. This is the system that keeps tabs of a user's search history and many people are not even aware exists because it is set as during Google's account setup procedure.

Testing the technique against ten volunteers, the researchers were able to retrieve up to 82 percent of the links visited by them during the test period.

The only current defense against this attack is for users to remains signed out of Google while using a Wi-Fi hotspot or to set up a personal VPN. Users could also disable Google Web History or purge its contents.

However, note Toubiana and Verdot also note that, "some issues cannot be addressed by users and require a modification of Google's cookie policy," The major worry remains the expansion of Google's tracking to other types of data in its Google+ service. "As Google is taking steps to include social indicators in result personalization, user's social network could soon be exposed."

Firesheep is a browser-based plug-in published a year ago by security developer Eric Butler to highlight security vulnerabilities in the way cookies for sites such as Facebook and Twitter were being exchanged across open Wi-Fi links without HTTPS turned on. Although not a new issue, Firesheep showed how easy it was to turn the flaw into a simple tool that could be used by any attacker.

Would you recommend this story? YES32 NO1

Sponsored Links
Comments (3)
Submit Comment

Once you click submit you will be asked to sign in or register an account if you are not already a member.

  • By ronin7752

    Sat Sep 10 16:11:59 PDT 2011

    I wish I could recommend this article to my customers, but it's too technical.

  • By johnnydollar2

    Sat Sep 10 17:52:34 PDT 2011

    Good article and reminder of the Sneaky jerks spying with Firesheep. Google Mail has settings to turn OFF web history. I did this on day one. There is no history on mine. Black-Sheep is one Temporary fix And using "HTTPS everywhere" from EFF, "Forced TLS" add on in Firefox and "KB SSL" in Chrome to keep Firesheep from spying. These aren't fixes of course. It's probably best nowadays to use a private vpn like Comodo's WiFi hotspot protection service or other such tunnels. If you're AT a Public Wifi spot? THERE are many Firesheep hackers waiting for you. Go check the total number of Downloads at FIRESHEEP's page if you don't agree.

  • By johnnydollar2

    Sat Sep 10 18:05:01 PDT 2011

    ronin7752 said

    I wish I could recommend this article to my customers, but it's too technical.

    Customers? Then if you're an owner and have WiFi PLEASE use a password to secure the router, Don't leave it wide open. Hang a sign telling all users what the password is so they can use Wifi and then cookies can't be side-jacked by Firesheep. EACH person's session will be secure. This is discussed at length on "Security Now" podcasts by Security experts. AND Google's Web history can be TURNED OFF in Google email settings so nobody can ever spy on your past if they DO get in. You can even purge the information.

View static HTML