Dia sniff cookie dengan new background process, dan simpan jd salah satu profile belah kiri sidebar. aku rasa bg process bukan buat mitm/arp poisoning psl dia pergunakan lib pcap. Maybe kena ada tambahan tool/utility utk part mitm. Script dia pun pakai javascript, sesuai untuk sesiapa nak tambah Web mana mana untuk disimpan. Wallahualam.
On Wed, Oct 27, 2010 at 4:12 PM, <[email protected]> wrote: > Dia injek cookies ka? > Sent from my BlackBerry® 9700 > > -----Original Message----- > From: Faizul <[email protected]> > Sender: [email protected] > Date: Wed, 27 Oct 2010 16:10:25 > To: Open Web Application Security Project (OWASP) Malaysia Local > Chapter<[email protected]> > Reply-To: "Open Web Application Security Project \(OWASP\) Malaysia Local > Chapter" <[email protected]> > Subject: Re: [Owasp-Malaysia] Firesheep: Very impressive and proven Tool > > _______________________________________________ > Owasp-Malaysia mailing list > [email protected] > https://lists.owasp.org/mailman/listinfo/owasp-malaysia > > OWASP Malaysia Wiki > http://www.owasp.org/index.php/Malaysia > > OWASP Malaysia Wiki Facebook > http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420 > _______________________________________________ > Owasp-Malaysia mailing list > [email protected] > https://lists.owasp.org/mailman/listinfo/owasp-malaysia > > OWASP Malaysia Wiki > http://www.owasp.org/index.php/Malaysia > > OWASP Malaysia Wiki Facebook > http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420 > -- _______________________________________________ Owasp-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.org/index.php/Malaysia OWASP Malaysia Wiki Facebook http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

