Firesheep Testing

January 14th, 2011, 3:59am by Kelvin

Just installed Firesheep to see what we’re up against. I couldn’t get it to work on my Windows 7 laptop (something about not having compatible drivers for the wireless adapters). Works on our Macbook though. Using that, I tried it out in the safety of our WEP-enabled home network. This is some scary stuff.

Main findings:


1) Jake was right, WEP doesn’t protect from Firesheep whatsoever
2) Surfing the mobile facebook, mobile Google and mobile Flickr sites on my Pre got my logins recognized by Firesheep. I could surf Mobile Twitter safely though. Twitter must use different cookies for their mobile site.
3) The Facebook, Flickr, and Twitter webOS apps didn’t trigger Firesheep, nor did checking email or syncing to Google PIMs from my Pre
4) Just opening Chrome on my other laptop exposed my Google login to Firesheep, without even going to any websites (I have Chrome open to Bookmark thumbnails page). 
5) When connecting 2 computers to my Pre’s Mobile Hotspot in WPA mode, Firesheep didn’t intercept anything.




2 Responses to “Firesheep Testing”

  1. Kelvin Says:

    Facebook and Twitter now both have https throughout (as an option). Still, you shouldn’t use Chrome on public Wifi. I think that’s pretty sneaky that Chrome would automatically log you into Gmail. I understand there are some benefits where the browser needs to know you you are (“App” syncing, bookmark syncing, cloud printing, etc)

  2. Kelvin Says:

    Also, based on my testing, you should be more leery if you’re on a public when there are more Macs in use. Just saying.

Leave a Reply


Copyright © 2019 The Board. All Rights Reserved.
No computers were harmed in the 2.315 seconds it took to produce this page.

Designed/Developed by Lloyd Armbrust & hot, fresh, coffee.