Even WPA2 wireless connections are susceptible to FaceNiff though it does require being connected to the same wireless network. Maybe a bit easier to use (and it works on WPA2!).Įven if you’re not interested in this app for educational purposes, it should serve as a reminder to be careful on wireless networks and use SSL whenever necessary. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks ( Open/WEP/WPA-PSK/WPA2-PSK) The next incarnation of this threat has made its way to Android smartphones through an app called FaceNiff.įaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. The best alternative is Cookie Cadger, which is both free and Open Source. There are 1 alternatives to FaceNiff for Linux, Mac and Windows. Using WiFi became a little more risky once FireSheep was introduced, a simplified way to snatch authentication info out of wireless packets, and a few big companies (Facebook, Twitter) responded by enabling HTTPS-by-default settings to mitigate the problem. FaceNiff is described as Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to and is an app in the Network & Admin category.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |