Skip to main content

How to hack a gmail account?

At Defcon, hackers demonstrated a tool to hack into GMail accounts by using snooping unencrypted data (man-in-the-middle attack) with cookies which GMail uses for everything other than login by default.


Now Google has introduced the ability to optionally encrypt any transmission to / from GMail and not just the login sequence. Previously login sequence was encrypted only. All other data was transmitted unencrypted making it vulnerable to hackers. That means every email, every article that you are reading on your GMail account is transmitted unencrypted over the web.




This makes it possible for an attacker sniffing traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. Once the hackers gets the session ID, hacker can log in to the account without the need of a password. People checking their e-mail from public wireless hotspots are more vunerable than the ones using secure wired networks.

Comments

Popular posts from this blog

கவர்ச்சிக் கன்னிகளின் அந்தரங்கம்

 

இடுப்பழகை கண்டு மயங்கி மார்பழகில் விழுந்தெழும்பியவரின் நிலை

  இடுப்பழகை கண்டு மயங்கி மார்பழகில் விழுந்தெழும்பியவரின் நிலை கவலைக்கிடம்

Strong passwords: How to create and use them (2)

Password strategies to avoid Some common methods used to create passwords are easy to guess by criminals. To avoid weak, easy-to-guess passwords: • Avoid sequences or repeated characters. "12345678," "222222," "abcdefg," or adjacent letters on your keyboard do not help make secure passwords. • Avoid using only look-alike substitutions of numbers or symbols. Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements, such as to replace an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd". But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password. • Avoid your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. T...