📜 ⬆️ ⬇️

On the "pocket" interception in the penultimate time

There are many different programs for android that implement one or another functionality for intercepting and analyzing traffic.
Most of them are single-tasking utilities that perform 1-2 functions (droidsheep, faceniff), although there are complex toolkits with a large declared set of functions (dsploit).

For the programs of the first type, the disadvantage is precisely their single-tasking, while the programs of the second type sin with an excess of useless features and an intricate interface.

Some time ago, the console version of Intercepter-NG, which works on Unix, including Android, was released.
The next step in the development of this version was the implementation of the native version of the sniffer for android, with touch controls and other amenities. The resulting tool may well reach the first positions in terms of functionality and usability.

Let's look at what happened.
image
')
At startup, a scan window appears in which you can find the active hosts of the current network and, if possible, determine their operating system. If desired, you can skip the scanning process.

Next, the main working window with several tabs opens.
image

The first tab displays the result of intercepting passwords \ messages \ files.
The second tab is the so-called raw mode, an easy analog of wireshark.
The third tab contains intercepted cookies.
The fourth tab with the settings.

image

The application itself is an add-on over the regular console version of Intercepter-ng.
It also allows you to download \ save pcap dumps, save the text log to the specified file.
Unlike the console version, SSLStrip is present here, allowing you to capture authorization from https resources.

The sniffer requires a device with an android version> = 2.3.3, as well as root access and the busybox application.

You can download Intercepter-NG Android Edition on Google Play or on the project website sniff.su

Source: https://habr.com/ru/post/161507/


All Articles