DroidSheep Undresses Network Security and Shows How It’s Done
Posted June 18, 2012 at 06:30 pm by Former Writer
Typically on XDA, we feature modifications and “hacks” for users to flash and enjoy. Every now and then, though, there’s an application that pops up that’s capable of actually hacking—at least to some extent. Not long ago, we brought you a network spoofing application that allowed people to mess with a computer while it was actively using a network. As a step up from that, there’s now an application to expose network security vulnerabilities from the comfort of your Android-powered device.
Before continuing, please keep in mind that this application is for educational purposes only, and and XDA does not condone information network intrusion on any network other than your own. The application was designed to test the security of social networking profiles over a network. The application was written by Security Researcher Andreas Koch and posted on the forums by XDA Forum Member virus786. As virus786 writes:
…information is not only transfered to its receiver but also to any other party in the network within the range of the radio waves. Usually nothing special happens because the WiFi users discard packets that are not destined to themselves. DroidSheep does not do this. It reads all the packets looking at their contents. Is a website sending a clear recognition feature within a message’s content, which can identify a user (“SessionID”), then DroidSheep is able to read it although it is not intended to external users. Moreover DroidSheep can use this token to use it as its own. The server can’t decide whether the authorized user or DroidSheep has sent the request.
While this sounds like some scary stuff, using HTTPS whenever possible limits the amount of useful information that applications such as DroidSheep are able to obtain.
Head over to the original thread to get started.
Want something on the XDA Portal? Send us a tip!