August 16th, 2005, 01:49 AM
MSN Hotmail users, guard your cookies. A simple technique for accessing Microsoft's free e-mail service without a password is in the wild and could be easily exploited.
The trick involves capturing a copy of the victim's browser cookies file. Once the perpetrator gains two key Hotmail cookies, there's no way to lock him out because at Hotmail, cookies trump even passwords.
What's scary about this is that once they have your cookies, they have your account forever. Even if you change your password, they can still get in.
Cookies, the small data files placed on an Internet user's computer when visiting websites, are primarily used to identify visitors for the purpose of customizing content such as advertising. But many sites, including Hotmail, also rely on cookies for more serious authentication purposes.
For such sites, the cookie is akin to an ATM banking card that doesn't also require the holder to provide a password. Lose the "card" and you may give up your security.
Cookies were never designed to be an authentication mechanism. But anyone trying to deploy a Web application today doesn't really have much choice. What's more, security bugs in Internet Explorer make robbing a remote user of his Hotmail cookies a snap.
At the Web-mail service, a half dozen cookies are written to the hard disk when the user clicks the "keep me signed in" option while logging in to the service. The option is designed to relieve Hotmail users of being nagged for a password each time they check their mail throughout the day.
Two of the cookies, set by MSN.com and named "MSPAuth" and "MSPProf," are the digital keys that allow an attacker to access the interior pages of a Hotmail account without being prompted to sign in, and to read and send messages from the account and change the account holder's preferences.
In tests, the Hotmail cookies appeared to stay on the PC unless the user clicked the "Sign Out .NET" button or re-booted the computer. Merely closing the browser did not delete them.
The Hotmail cookie problem could stem from a bug in an optional feature offered by the service. Hotmail enables users to configure a "session expiration" option that promises to "automatically end" the user's session after a specified time interval.
But even with the expiration option enabled at its most secure setting, testing showed that a cookie could be exported to another computer and still used to authenticate a password-less Hotmail login 24 hours later.
There's little Microsoft can do to guard Hotmail users against cookie attacks. Since Hotmail is designed to allow users to access their accounts from any computer anywhere, the service's authentication cookies do not appear to constrain access based on a user's Internet Protocol address.
A Hotmail user's best defense against cookie robbers is to shun the "keep me signed in" option, and to follow Microsoft's advice and click the service's sign-out icon when finished with a Hotmail session.
I hypothesize that the majority of them sign on first thing in the morning and stay logged in to their Hotmail accounts all day. I don't think they realize this is setting them up to have their identities stolen
August 16th, 2005, 02:06 AM
there goes the neighborhood!
August 16th, 2005, 02:23 AM
now days hackerz are getting smarter and better, they have just overpassed the limit!
I just wish someone does sumthing to stop those hackerzz..
August 16th, 2005, 02:48 AM
Remember not to use the "keep me signed in" option. That should solve this. I wonder if this works the same with all web-based emails?
August 16th, 2005, 03:10 AM
I dont think all of em, cuz there are sum cheap mail hosts, believe me i'v registere in em and boy did i get smamed!