Labels

.NET Acronis Backup activate easytether ADB ALL MOBILE RESAT KEY amoled Android Android 4.3 Android 4.4 Android Games Android Lollipop Android M android tether android tether fedora android tether mac android tether ubuntu android tether windows Antivirus/Security AOMEI aosp appanite ripoff appanite scam Areca Argentum Backup Azure SDK 2.9 Backup BackUp Maker Backup4all BackupAssist Battery Saving blackberry 10 tethering blackberry easytether blackberry tether Books & Reference Browsers Business Software Camera charging checkbox Customization cyber week sale Data Recovery Samsung Desktop Enhancements Developer Analytics Tools developers beware DirSync EaseUS easytether easytether activate easytether activation code easytether activation key easytether apk easytether app world easytether code easytether deal easytether drivers easytether full apk easytether key easytether sale easytether verizon easytether with fedora Educaton Extension auto-update FBackup find Galaxy Note data Find Lost Samsung Data from Formatted or Corrupted Memory FREE Free samsung flash software for all samsung model wiht direction free sony mobile flash soft and coad galaxy note photo recovery GalaxyS6 Games Get back Deleted Data from Samsung get back lost data from Samsung get back samsung galaxy files gridview H4ck1ng Hacking WiFi Password kindle tether kindle tethering Launcher Leaked LG G2 LG G3 LG G4 lockscreen Macrium Reflect material design mobihand android mobihand nonpayment mobihand payment mobihand ripoff multitasking mybackup Node.js Tools 1.2 Alpha OleDbConnection OnePlus Paragon ported apps Python Tools for Visual Studio 2.2.3 QILING recover data from samsung recover lost data on Samsung Galaxy Note 7 resize restore samsung galaxy note retrieve data from samsung phone retrieve deleted data on galaxy note 7 retrieve deleted files from samsung galaxy note retrieve lost photos from note 7 richard wood ripoff ROMs root samsung data recovery tool Samsung Galaxy Note Data Recovery Samsung Internal Memory Recovery samsung sd card recovery Screen sebastian dijmarescu ripoff stolen royalties System.Data.OleDb tablet tether tablet tethering undelete data from samsung note 7 undelete galaxy note data Universal Windows Platform Tools unpaid developers useful tools verizon tether Visual Studio 2015 Update 2 walkthrough wd smartware www.mobihand.com xposed framework

Android WiFi Hacking - How an MITM attack works?

zANTI, Dsploit, Csploit, Faceniff and many, many more similar hacking apps are using a specific kind of attack called MITM - the Man In The Middle attack. What exactly does this attack do and is there any way to protect yourself from it? Read on!

Man In The Middle aims to control a victim by becoming the "man in the middle". Let's make an example.

We got person A and person B. Let's name them Rami and Jovie. They're friends and just chatting through an unencrypted connection (http). Alice wants to hang out, says:

 - Sup Jov, gimme your public key, I want to chat!

Rami is requesting a Public key (known as asymmetric cryptography - used to encrypt data and verify them as a digital signature)

Rami and Jovie don't know one thing. There's an evil person Miro intercepting everything they say.
What happens here is that the sent message goes first to Miro and then gets sent to Jovie. He doesn't spot anything, the message is the same, nothing's really suspicious at the moment.
Jovie responds:

- Yo Ramy, let's chat. Here's my key: materialFTW123

Miro now knows the Jovie's public key but instead of sending this key directly to Rami, he sends his own public key. Miro slightly edits the message:

- Yo Ramy, let's chat. Here's my key: motiondesignFTW123

Now they can encrypt the whole conversation with their private encrypt alghoritm. However, they don't know there's someone who's edited it so he can view and control the whole conversation between these two guys.

- [encrypted with Miro's key] Let's hang out, bring some booze lol

Miro then encrypts it to Jovie's original key (materialFTW123) so he doesn't spot a thing. Then he resends it to Jovie and the conversation goes on.


..

This way the attacker can take control over a conversation and not only he can intercept it but also change it. Boom, we have redirect, script injection, replace images and many more features.


Here's a screen from MITM section in cSploit app. There are several MITM features starting from innocent "simple sniff" that sniffs through the traffic and monitors up/down, and password sniffer, that inputs passwords from the victims.


Now, is there any way to protect from these attacks? Yup, and it's not difficult at all.

Firstly, be sure to be on HTTPS. You can always check it in he URL bar. There's a feature SSLStrip that prevents from connecting to HTTPS but it cannot redirect you to HTTP while on HTTPS. So if you're on HTTPS, you're good to go.

Use WiFi Protector. WiFi protector is a handy app for your Android device that monitors the net and alarms you if there's an intruder (also shows his MAC/IP adress and can even protect you from the atttack if you're rooted). Download

Try not to connect to public networks - they're the biggest threat. But fortunately these attacks are not that often and you shouldn't really catch a hacker if you're mostly on private WiFis.



0 Response to "Android WiFi Hacking - How an MITM attack works?"

Post a Comment