# Mobile Hacking Tools


Alright, the world has pretty much gone full mobile nowadays so it makes sense to bring this up when discussing digital security in terms of ethical hacking. The tool I’m about to present is called Droidsheep and it’s a very straightforward Android tool that uses a spoofing as a mean to get to someone else’s information.


Spoofing is when someone or some program successfully disguises itself so it can reach a certain information that was previously unaccessible or to gain illegitimate advantage. There are many types of spoofing and here we’ll be focusing on ARP Spoofing.

Address Resolution Protocol (ARP) Spoofing

In this case the attacker masquerade itself as another host in the local are network. It can intercept data frames and even modify traffic. It is mostly used as a man-in-the-middle attack, where it inserts itself between a LAN host and user.

Droidsheep, how does it work?

The app is very straightforward. As soon as you open it there are a couple of checkboxes you can choose and a big start button. First thing you see when Droidsheep is opened Checking the ARP Spoofing box instructs Droidsheep to search for hosts that are more easily exploitable, like Facebook or Twitter. Checking the Generic box will search for every data on the network, which you might not be able to exploit or access anything relevant. After scanning the network the app display the cookies that he received after disguising the smartphone as host (spoofing). Scanned network

Once clicked on, several options are available to the attacker, such as opening the website that is being accessed and steal someone’s session in it, save cookies for later as well as export and send the cookies via email to access via a tabletop computer or other device. Options available for the selected session That sums up the whole point and goal of the app. Ethically, its main usage is to measure how secure your website is for the users accessing it. It’s worth pointing out that Droidsheep only access cookies relate to web browsers on a HTTP protocol. HTTPS are secured against Droidsheep. Session successfully highjacked


As the app is considered a potentially hostile software it is not possible to install it on your Android phone without a few steps. First of all, the app acts on some commands and utilities that require root access to the operating system, in this case, Android. This is done by rooting the device so you can get root privileges on everything and fully take control of your smartphone. In Canada it is not clear within the law if you’re allowed to root your phone. Some manufacturers allow it, some don’t. Make sure you’re not voiding your warranty before carrying this out. Once with root privileges, some other utilities are needed and are provided by an app called Busybox. This app provides your already rooted phone some other Linux like commands that are required for the proper functioning of Droidsheep. It’s worth mentioning the the Android version should be 4.3 (Jelly Bean) or 4.4 (KitKat) as those are the only ones on which Droidsheep can operate.