dSploit – Android network analysis


download

Introducing dSploit
dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc . This application is still in beta stage, a stable release will be available as soon as possible, but expect some crash or strange behaviour until then, in any case, feel free to submit an issue on GitHub.

Why?
You might ask why there’s the need of another tool like zAnti, NetSpoofer, DroidSheep, FaceNiff, etc.

Don’t get me wrong, i have nothing against proprietary software, i’ve been in contact with zAnti staff for a while now, i think they’re a really great and open minded team, but closed source is closed source, there’s no community contribution and most of all, you have to pay for it. Secondly, every tool i’ve found was very specific, none of them had every feature i needed so most of the times i had to use three or four tools at a time, which is kinda frustrating.

Therefore, dSploit was born, only one ( open source ) tool to rule them all!

WiFi Cracking
The WiFi scanner will show in green access points with known default key generation algorithms, clicking on them allows you to easily crack the key, supported models: Thomson, DLink, Pirelli Discus, Eircom, Verizon FiOS, Alice AGPF, FASTWEB Pirelli and Telsey, Huawei, Wlan_XXXX, Jazztel_XXXX, Wlan_XX, Ono ( P1XXXXXX0000X ), WlanXXXXXX, YacomXXXXXX, WifiXXXXXX, Sky V1, Clubinternet.box v1 and v2, InfostradaWifi.

RouterPWN
Launch the http://routerpwn.com/ service to pwn your router.

Trace
Perform a traceroute on target.

Port Scanner
A syn port scanner to find quickly open ports on a single target.

Inspector
Performs target operating system and services deep detection, slower than syn port scanner but more accurate.

Vulnerability Finder
Search for known vulnerabilities for target running services upon National Vulnerability Database.

Login Cracker
A very fast network logon cracker which supports many different services.

Packet Forger
Craft and send a custom TCP or UDP packet to the target, such as Wake On LAN packets.

MITM
A set of man-in-the-midtle tools to command&conquer the whole network.

Simple Sniff
Redirect target’s traffic through this device and show some stats while dumping it to a pcap file.

Password Sniffer
Sniff passwords of many protocols such as http, ftp, imap, imaps, irc, msn, etc from the target.

Session Hijacker
Listen for cookies on the network and hijack sessions.

Kill Connections
Kill connections preventing the target to reach any website or server.

Redirect
Redirect all the http traffic to another address.

Replace Images
Replace all images on webpages with the specified one.

Replace Videos
Replace all youtube videos on webpages with the specified one.

Script Injection
Inject a javascript in every visited webpage.

Custom Filter
Replace custom text on webpages with the specified one.

Well, first of all, the only software which is comparable to dSploit in terms of features and support is zAnti ( refer to the following comparison table ), which is a proprietary tool and obviously closed source.

, ,

  1. No comments yet.
(will not be published)