• 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[Android] Shark for Root
#1
Shark for Root is app developed to sniff packets going through an Android Phone. Credits go to ex87 over at XDA-Developers for creating this app. The app requires root and is based on TcpDump. You can scan the Barcode below to download it.
[Image: http___market_android_co.png]

To support Shark for Root we are also going too need an app called Wireless Tether for Root, or If you're a lucky CM user, you have "Portable Wireless" built in. If you need to download Wireless Tether for Root scan the Barcode below.
[Image: http___market_android_co.png]

If you receive a screen like the one below at any point in the tutorial, click allow. This is just allowing root programs to be run.
[Image: WirelessTetherSU.png]


So lets get started. Begin by creating an an open hotspot on your phone

Wireless Tether
[spoiler]
[Image: WirelessTether.png]
That's the screen you should be greeted by when opening the app. At this point you want too hit Menu -> Setup, and change your SSID to something official looking. Like below
[Image: WirelessTetherSSID.png]
Then simply click the green WiFi button from before + Start Tethering!
[Image: WirelessTetherTETHERED.png]
[/spoiler]


CyanogenMOD
[spoiler]
Browse too Wireless&Networks -> Tethering & Portable Hotspot, and enable "Portable Wi-Fi hotspot"
[Image: PortableWiFiENABLED.png]
Then hit Portable Wi-Fi hotspot settings -> Configure Wi-Fi Hotspot
Set your SSID as something official looking, and make sure the security is set too open (should be by default, check anyway)
[Image: PortableWiFiSettings.png]
[/spoiler]

Great so now we have our Open Wi-Fi, we need to sniff the packets going through it! This is is incredibly easy.
Open Shark for Root and click "Start" couldn't be easier. Once you've finished hit "Stop"
[Image: SFR.png]

The file will be saved in a pcap on the root of your SDCard under the name "shark_dump_[number].pcap"
The number is random, so you will need to keep track of what you it's saved as when the sniffer is running. That PCap can later be put into software like ettercap or WireShark for examination.
That text box is the options applied too TcpDump when it is run. Those options for basic users will be fine. But if you would like to know other options that can be applied check out TcpDumps man page: http://www.tcpdump.org/tcpdump_man.html it has everything you need to know about the program. If you break something- I will just laugh. All I'm saying.

Note: Do NOT follow this tutorial unless you have unlimited data (And in the US a Tether Plan) Else you may incur a ridiculous bill.

-Drumm
[Image: nomnomnom.jpg]
;7$=v?%v%#5>v7v8994
The decrypt code is V, I could not make it any simpler!
  Reply
#2
Update: Made this post into a full tutorial.
[Image: nomnomnom.jpg]
;7$=v?%v%#5>v7v8994
The decrypt code is V, I could not make it any simpler!
  Reply


Forum Jump: