On Habré, there was already an article about
Intercepting user accounts on Wi-Fi networks with Android using the DroidSheep
utility (a small
Russian howto for the lazy ).
Using this program, I was faced with the question: how would I save captured sessions? DroidSheep allows you to send intercepted sessions by mail. But it is very inconvenient for me. I would like to save the session in the usual
pcap format for further analysis on a stationary computer via
WireShark (or through its counterpart on the android
SharkReader ).
In fact, the task can be reformulated: we need
arp-spoofing with the ability to log all intercepted packets into the pcap format. The proposed option does not claim to be optimized in any way. But it is quite efficient.
')
I decided that the issue is solved by a bunch (joint work) of 2 programs:
1. to organize an arp-spoofing attack
2. for logging into the usual pcap
The first question is solved automatically: DroidSheep allows you to organize arp-spoofing.

A cursory search for other programs of this class did not work.
The second question is solved using the
Shark program.



It would be more flexible to use passive traffic listening in wireless networks using
aircrack-ng . But
installing aircrack-ng for Android is non-trivial. But not so heavily attacking the network.