SlideShare a Scribd company logo
Firesheep How to change your friend’s Facebook status
Session hijackingSteal your cookiesMan in the middle attack:Arp poisoningOpen wifiDNS spoofingDHCP exhaustionOld news: Cookie monster, Hamster & Ferret
FiresheepRetardedly easyFirefox add-onSciddy friendlyDesigned for sites specifically
DEMO
ProtectionSSLSSL CookiesFirewall between IP’sARPcopDon’t ever share wifiNever leave your houseDon’t get on the Internet
BlacksheepDetects firesheepDesigned to make people feel better

More Related Content

PPTX
Interactive
PDF
10 tips for a disastrous event
PPTX
PPT
Hacking Tor ( How does Tor work ?)
PPSX
Secure your public WiFi
PDF
Advanced WiFi Attacks Using Commodity Hardware
PPTX
05 wi fi network security
PDF
Web & Wireless Hacking
Interactive
10 tips for a disastrous event
Hacking Tor ( How does Tor work ?)
Secure your public WiFi
Advanced WiFi Attacks Using Commodity Hardware
05 wi fi network security
Web & Wireless Hacking

Viewers also liked (18)

PDF
Offline bruteforce attack on WiFi Protected Setup
PDF
Wireless Hacking
PDF
Offline bruteforce attack on wi fi protected setup
PPT
The Dark Net
PPTX
Tor the onion router
PPTX
How TOR works?
PDF
Ethical Hacking & Penetration Testing
PPT
Tor Presentation
PDF
Penetration Testing Execution Phases
PPTX
TOR NETWORK
PPTX
WiFi Secuiry: Attack & Defence
PPT
Darknet
ODP
The Deep and Dark Web
PPT
Wireless security presentation
PPT
Deep Web
PDF
Metasploit for Penetration Testing: Beginner Class
PPTX
Web Security Workshop : A Jumpstart
Offline bruteforce attack on WiFi Protected Setup
Wireless Hacking
Offline bruteforce attack on wi fi protected setup
The Dark Net
Tor the onion router
How TOR works?
Ethical Hacking & Penetration Testing
Tor Presentation
Penetration Testing Execution Phases
TOR NETWORK
WiFi Secuiry: Attack & Defence
Darknet
The Deep and Dark Web
Wireless security presentation
Deep Web
Metasploit for Penetration Testing: Beginner Class
Web Security Workshop : A Jumpstart
Ad

More from antitree (20)

ODP
Hardening ssh configurations
ODP
State of wifi_2016
PDF
Just Mouse Jack Init
ODP
Introduction to ethereum_public
PPTX
Docker Security
PPTX
Reinventing anon email
PPTX
0x20 hack
PPTX
Laverna vs etherpad
PPTX
Meek and domain fronting public
PPTX
Nsa and vpn
PPTX
Salander v bond 2600
PPTX
Salander v bond b sides detroit final v3
PPTX
Pentesting embedded
PPTX
Corporate Intelligence: Bridging the security and intelligence community
PPTX
28c3 in 15
PDF
Android Hacking
PPTX
Lock picking barcamp
PPTX
Lock picking 2600
PPTX
Image based automation
PPTX
How [not] to throw a b sides
Hardening ssh configurations
State of wifi_2016
Just Mouse Jack Init
Introduction to ethereum_public
Docker Security
Reinventing anon email
0x20 hack
Laverna vs etherpad
Meek and domain fronting public
Nsa and vpn
Salander v bond 2600
Salander v bond b sides detroit final v3
Pentesting embedded
Corporate Intelligence: Bridging the security and intelligence community
28c3 in 15
Android Hacking
Lock picking barcamp
Lock picking 2600
Image based automation
How [not] to throw a b sides
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Spectral efficient network and resource selection model in 5G networks
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Anti tree firesheep