Firesheep HTTP Session Hijacking Tools

Firesheep HTTP Session Hijacking Tools


Firesheep HTTP Session Hijacking Tools, nowadays maybe there’s a lot of people know about cracking (network cracking), it is a modification or disable features which are considered undesirable by the person cracking the network. Maybe for some people when they hear about cracking the network it looks like a very hard todo’s because it involved a high skill programming language or understanding networking.

What is Session Hijacking

Every time you connected to the web application (usually a dynamic web application) you will have a unique ID called "session", this session will identifies you as a valid user and will always valid until you kill the session (log out process) or the session has expired. Some bad people trying to identifies or guessing the session ID value to gain privileges as a valid user in a web application.

Firesheep HTTP Session Hijacking

Firesheep is a firefox extension to do the session hijacking. I was very surprised that this tools can hijack Facebook, Twitter, WordPress, Amazon, etc from the valid user. The most important thing that this tools is very easy to configure and to launch an attack. Just a few step :

1. Download Firesheep

2. Sit on a unencrypted wireless network

3. Turn on your wireless card(support promiscious mode, such as : atheros, orinocco, etc) and join the network

4. Start capturing with firesheep

5. Just wait until some user authenticate at the facebook, twitter, etc.

Step by Step Firesheep Configuration

1. The picture below is the interface of firesheep(click view –> sidebar –> firesheep) and you can click the red circle for preferences

Firesheep HTTP Session Hijacking Tools

2. In this picture you should choose which interface you want to capture the data. for example when you’re in a wireless network, you should activate the wireless adapter.

Firesheep HTTP Session Hijacking Tools

3. This picture below tells you which website session can hijacked handle by this addons,

Firesheep HTTP Session Hijacking Tools

4. Usually when capturing data, will use TCP port 80, because if it’s 443 I think will be encrypted, but I still didn’t try for another port :-).

Firesheep HTTP Session Hijacking Tools

5. When you finish, click the "Start Capturing" and wait until someone authenticate some website on the website list.


1. You can use Blacksheep,

2. You can tunnel your internet connection,

3. Don’t use "Remember Me" feature in public internet area(Hotspot), and logout after you finish use the internet.

4. Some people says that clear the browser cache and history may be another way, but you can read my other posts why it’s not the really good way

That’s it. I hope you can use this tutorials in a good way ๐Ÿ™‚ if any question, you can contact me or drop some comment.

(Visited 7,169 times, 1 visits today)

Share this article if you found this post was useful:

Blogger at Love PHP, offensive security and web.
Contact him at me[-at-]

See all posts by || Visit Website :

  • Pingback: Session Hijacking Using Hamster and Ferret | Vishnu Valentino()

  • nanonymouse

    cool.. nice stuft !! ๐Ÿ˜€

    • v4L

      yes…you can try it….it working good in a wireless network…as long as the access point didn’t use WPA2 or higher for their data encryption ๐Ÿ™‚

  • Pingback: Blacksheep Countermeasure for Firesheep | Vishnu Valentino()

  • Pingback: Create Secure Connection Using SSH and Putty to Prevent Sidejacking | Vishnu Valentino()

  • nice tutorial bro.. let's try it ๐Ÿ˜€

  • v4L


    Thanks bro…please try for your *knowledge ๐Ÿ™‚

  • luftwaffe

    bos ini cuma bisa kalo card adapternya dukung promiscuous mode aja, kalo ga dia cuma bisa baca data lokal PC kita aja, oya gmana kalo di LAN ( cable ) apa bisa ya ?

    • v4L

      Iya betul…memang tools ini baru berfungsi di wireless card yang support promiscious mode aja ๐Ÿ™‚

  • argenta

    My wireless adapter is Realtek RTL8191SE Wireless LAN 802.11n PCI-E NIC
    does this adapter support promiscuous mode ?

    • v4L

      I haven’t try the realtek, but if you want to make sure your wi-fi card supported promiscious mode or not, you can try some application that needed promiscious mode for your wi-fi card, such as :
      One thing you should know that promiscious mode means that your device will receive all network traffic(even the packets not addressed to you), so when you activate or trying the tools, just check it…are there any packets captured by the application?If the application captured nothing, it’s mean that your wi-fi card doesn’t support promiscious mode. Hope it help you ๐Ÿ™‚

  • Pingback: How to Delete Browser Cookies, Cache and History | Vishnu Valentino()

  • bro…salam indonesia..
    kalau wireless USB gw TL-WN722NC..
    kira2 bisa gak ya?

    • v4L

      harus dicoba bro…cobain beberapa program yang emang membutuhkan kemampuan wi-fi card untuk melakukan promiscious mode misalnya : wireshark, firesheep. Kalau tools tersebut dicoba dijalankan coba dilihat apa menangkap suatu paket data?kalau misalnya nggak ada, berarti kemungkinan wi-fi card nya nggak support promiscious mode ๐Ÿ™‚ itu yang saya tahu buat ngecek bisa/nggak nya. Tapi kalau yang pasti “Atheros sm Orinocco” itu udah pasti bisa Promiscious Mode.

  • bro udah instal Add onnya ๐Ÿ˜€
    tp kok ga ada pilihan capturingnya yah? dimana sih tombolnya?

    • v4L

      Itu ada di langkah ke-1 dan ke-2 bro ๐Ÿ™‚

  • nice stuff..
    i wanna try it

  • doni

    I've been there in download page, but there is no version for linux. Is there is any version for linux? 

    • v4L

      I think the developer have not yet add the linux version…because this tools is still for windows…CMIIW

  • azura

    hmmmmpppfff…not supported on linux…………..damned!

  • my atheros didnt show up in dropdown. any help??

  • har

    I have visited porn sites from my job's pc. I deleted my history, cache, cookies, temporary files and so, but how can i know if they are stored on the main company's server, how can i delete them?

    • v4L

      The answer is you can’t ๐Ÿ™‚ because your company server maybe already cache it and already record your IP address with website(porn) destination…if you can install any software on your PC, maybe you can tunnel your connection or use any circumventor software on the net to minimize detection from your company proxy server.

  • Pingback: Firesheep Session Sidejacking (Mozilla Firefox Extension) | Try n Error()

  • shu

    gan..donlotny kok ga bisa ya
    sy pake windows7 home edition
    tpi hbs donlot ga ad buat installny gtu
    mohon pencerahanny ya
    thanks ๐Ÿ˜€

    • v4L

      itu memang bukan diinstall, cukup di drag and drop ke firefoxnya

  • Mars

    Hi Dude.
    Firesheep Is Not Still Compatible With New Versions Of Firefox, So:
    1) Do You Know Bypass For It ?
    2) Is There Another Tools Like This That Prevent Side Jacking [ Session Hijacking ] , its better if it’s like an addon.
    ty sir :X

    • v4L


      1. I’m out of date with that

      2. you can buy a VPN or you can view the cheap but good solution http://www./hacking-tutorial/create-secure-connection-using-ssh-and-putty-to-prevent-sidejacking/

  • Farhad

    Hi sir, first thanks for your wonderful tutorials.I have a problem that is i installed the firefox extention but i cannot see it’s interface in the “view” ? please help me

  • aqeel

    is session hijacking possible only when victim is in same network ???

  • MIke

    what language is Firesheep written in

  • dessea

    please inbox by me all the steps to demonstrate session hijacking in local area network on desk top computers …it is given as aproject // please help meeee/// 10Q

  • Ipnet Guru

    This is not real Session Hijacking, rather, it is more like sniffing.