I would like to announce you the first public release of The Cookie
** cookiesniffer **
cookiesniffer is a simple and powerful cookie sniffer that recognizes
(through heuristics) and reconstructs (through libnids) new and
existing HTTP connections, parsing any valid or partially valid HTTP
message. The output is a set of files containing the gathered
information with time-stamps in a format that can be trivially
searched and parsed with standard UNIX tools such as grep, awk, cut
and sed. It supports wireless (AP_DLT_IEEE802_11) networks.
** analyzers **
this set of Bash scripts help you to analyze quickly the logs of cookiesniffer.
** cookieserver **
with cookieserver you can impersonate the cookies of someone else in
your browser using the logs of cookiesniffer (in few seconds). This
attack is also called "side-jacking", "cookie replay attack" and "HTTP
session hijacking" but probably I'm missing other fancy names. This is
something known from ten years but that is still (too much) effective.
This project is released under license GPL version 2.
A list of public vulnerable web services is available here:
If you know other vulnerable services, mail me and i'll add them to
the VULN list.
If you know some not vulnerable services, mail me and i'll add them to
the SECURE list.
Use "COOKIETOOLS LISTA" as subject to skip my spam filters.
why HTTPS is not the default in this type of services? this is a big
silent hole. maybe, today is less silent :)
Michele Dallachiesa 'xenion' http://xenion.antifork.org
Antifork Research, Inc.