Becoming HACKERS FROM ANDROID: PART 2

Bue bue good! Avoid such talk. This is the second part of the 5 we see in this series of post to become "hackers" from our Android. 

In the previous part we saw enter private WiFi networks, making dictionary attacks or default keys routers. Nothing new or interesting. And you wonder why I made that post.The answer is because when entering the private network of our victim, or friend endless possible attacks, both saturating the network, steal account data (this is illegal) and also make denial of system opens the network router, including xD 

But for now we just want to spy on what our "victim" is searching the Internet. Although we can also capture packets and store cookies on the network to open sessions on our phone or pc as I said before, but this time not aremos. We only focus on the "Espionage Network" 

But first we need to have the right application to do this. And have the device configured to run. It 

is essential to have our mobile Android rooted. If we are not root users or super users as you want to call. We will not do this post. 

The application that we will use will be to DroidSheep  Download it by clicking on the name;) When we installed the App La begin and the first thing that appears obviously permit applications Root of give the root permissions and enter. in the application Begun we will come out and note where the developer disclaims responsibility and accept demos since we are responsible for the use of the application. Only accept demos as seen in the image






Well now we are responsible for our crimes xD (SARCASM) we jammed the second option in menu and we start as shown below. I recommend to always use the second option to see all processes that use Internet network.


All right. uff very difficult. From now we appear all the websites that our victim is watching with his ip to identify the device or devices that are using the Internet. Well I just want to clarify that capture pages bone unsecured pages that have a different url> https: <eg Facebook, Twitter, Google + and Outlook are very secure pages so we can not steal these pages sessions, YET. Then we will see how to force devices to use "unsafe" connections to steal your session and we must do to defend ourselves, and everything from our Android. But it is now we continue our theme: l 

Since we are capturing packets with our mobile only wait until they appear to us, if we allow ourselves already appear precionado the process to see that gives us options as shown below


I precionado the process leaving us options appear as shown
Open site helps us to emulate in our cell with the credentials of the victim who is visiting the page. For example if you wear the Web site from a computer page will open as if estiviramos on the computer not in the mobile version (for cellular) 

other options not explain them for security reasons. And this will be it for this article. 

In Part 3 we will see and like, using another application revoke access to internet to any device that is connected to the network, intercept passwords and even use remotely vulnerable computers. This is almost impossible because most have patches to prevent this. But ... nothing is impossible. We will also see to do to defend against these attacks on our network ee 

A greeting and you do not lose track of these items as we will increasingly moving in degrees of difficulty. 

See you soon and remember do not let nade you say "pa ke kieres know that haha greetings "ee

Post a Comment

0 Comments