Security Basics mailing list archives

Firefox Bypass Master password Vulnerability


From: hack2prison () yahoo com
Date: 26 Jul 2010 11:58:41 -0000

Firefox has a useful function: manage login information which allows users
remember their username and password.
When users browse the site which they saved login infomation it will auto fill
login form.
Users can view the username and password saved by click Tools --> Options -->
Security --> Saved Password.
That is not safe but Firefox has option to protect this infomation that is "Use
a Master password" (Image 1):
http://www.shareapic.net/View-21364528-Use-Google-Chrome-to-hack-Firefox.html

Once run Firefox and browse pages which saved login information, Firefox will
ask Master Password. If type right Master password , Login information will be
used (Image 2):
http://www.shareapic.net/View-21364535-Use-Google-Chrome-to-hack-Firefox.html

More people believe this Master password but I detected that other person can
use Google Chrome to "HACK" Firefox.

Install Google Chrome and browse a website (saved login information) and you
will be surprised because login information are auto filled (Image 3):
http://www.shareapic.net/View-21364541-Use-Google-Chrome-to-hack-Firefox.html

Discovered by Hack2Prison 
Source: http://admindiscuss.com/forum/showthread.php?tid=35

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: