![]() ![]() ![]() Our motivation for creating the test environment described herein is to make it incredibly easy to capture packets for any device with a WiFi connection, with very little client configuration needed. There are no applications to capture packets on iOS. Using packet capture software on Android is impossible without first rooting the device, and even then, difficult to use and export saved data. Unfortunately, monitoring one’s phone to see what, and to whom, data is sent is not exactly simple. Researchers and end-users alike often seek to understand what data their mobile device is sending to third parties. Setting one up yourself is not user-friendly, and requires familiarity with the unix command line and networking concepts. This article presents a detailed look at how this test environment works and then gets into how to set one up for your own testing purposes, including a list of required parts. All connected clients’ HTTPS communications are subjected to a “Man-in-the-middle” attack, whereby they can later be decrypted for analysis. ![]() Specifically, we have created a WiFi hotspot that is continually collecting all the packets sent over it. We have developed a technical test environment for capturing and decrypting WiFi data transmissions. Posted by Andrew Hilts Analysis Pen Testing Programming Security ![]() Snifflab: An environment for testing mobile devices ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |