Cookie-Cadger helps identify information leakage from applications that utilize insecure HTTP GET requests.

Web providers have started stepping up to the plate since Firesheep was released in 2010. Today, most major websites can provide SSL/TLS during all transactions, preventing cookie data from leaking over wired Ethernet or insecure Wi-Fi. But the fact remains that Firesheep was more of a toy than a tool. Cookie Cadger is the first open-source pen-testing tool ever made for intercepting and replaying specific insecure HTTP GET requests into a browser.

Cookie Cadger is a graphical utility which harnesses the power of the Wireshark suite and Java to provide a fully cross-platform, entirely open-source utility which can monitor wired Ethernet, insecure Wi-Fi, or load a packet capture file for offline analysis.


cyborg@cyborg:~$ sudo cookie-cadger 
tshark located at /usr/bin/tshark
Querying tshark for capture devices; tshark output follows:
tshark: Lua: Error during loading:
 [string "/usr/share/wireshark/init.lua"]:46: dofile has been disabled due to running Wireshark as superuser. See for help in running Wireshark as an unprivileged user.
1. eth0
2. teredo
3. nflog
4. nfqueue
5. any
6. lo (Loopback)
Capture device search completed with 6 devices found.

cookie screen Cookie-Cadger
Press Yes (Of course read about legality first )

cookie Cookie-Cadger


Set the Interface and Start Capturing Cookies 

cookie-cadger Cookie-Cadger


Leave a reply


We're are building as a community and a team. Be a part of it.


©2018 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?