What's new

Android App Intercept images from a network (Public wifi, Intranet, etc)

If it is indeed an MitM attack, then it is only possible if the public WiFi is not "isolated" or not on a separate VLAN, otherwise, you may not be successful with an MitM attack since the network you're connected to do not have communication with the other devices connected to the same network.
 
di po advisable arp poisoning (these days), for education purpose only!

bad opsec po yan sa mga amateur.
mapupunta sa badness enumeration ang inyong device, yung apple devices may mitigations dito (protection frames, and automatic static arp entry/immunity) pero makikita nila (apple company) at matatandaan nila mga device na ginamit pang häçk, tapos kung may paymet apps ka pwedeng maalala or matugma nila ito (metadata, credit profiling).

kung pc naman kahit palitan/spoof mo pa ang mac naanounce padin ang ating original mac, tapos lilitaw yan sa ipv6 mac leakage which leads to detection again. bukod pa doon identified nadin ang inyong device at user location as per Exposure Notification. kung harmless naman or learning purpose on your own network goods pero sa mga nagbabalak outside, keep that in mind. ang mitigation dito is static arp entry pero need ito ng root sa ibang phone or set by manufacturer (sa ibang android) pero default mitigated by iphones/macs. Apple devs are aware of this issue kaya ginawaan nila ng auto static arp, randomized/auto-change mac upon detection, atbp. kasi flaw na LAN protocol ang arp attacks.

just like port scanning, ingat lang po kayo sa paggamit ng mga tools sa panahon ngayon. dahil minsan pag nag port scan (kahit di naman mahigpit dati) may chance na iblock ka na ng cloudflare pag napunta sa dnsbl/abuseipdb lalo sa mga naka static IP, same din yan sa wifi/local networks, may list din ng mga abusong mac address/devices pero di ganon kahigpit (kasi they assume your device may be tunneling the attacker).

so far. goods naman yung info ni TS, sharing is caring. sometimes we learn from mistakes and experiences, that's the häçker way.
 
salamat dito bossing
di po advisable arp poisoning (these days), for education purpose only!

bad opsec po yan sa mga amateur.
mapupunta sa badness enumeration ang inyong device, yung apple devices may mitigations dito (protection frames, and automatic static arp entry/immunity) pero makikita nila (apple company) at matatandaan nila mga device na ginamit pang häçk, tapos kung may paymet apps ka pwedeng maalala or matugma nila ito (metadata, credit profiling).

kung pc naman kahit palitan/spoof mo pa ang mac naanounce padin ang ating original mac, tapos lilitaw yan sa ipv6 mac leakage which leads to detection again. bukod pa doon identified nadin ang inyong device at user location as per Exposure Notification. kung harmless naman or learning purpose on your own network goods pero sa mga nagbabalak outside, keep that in mind. ang mitigation dito is static arp entry pero need ito ng root sa ibang phone or set by manufacturer (sa ibang android) pero default mitigated by iphones/macs. Apple devs are aware of this issue kaya ginawaan nila ng auto static arp, randomized/auto-change mac upon detection, atbp. kasi flaw na LAN protocol ang arp attacks.

just like port scanning, ingat lang po kayo sa paggamit ng mga tools sa panahon ngayon. dahil minsan pag nag port scan (kahit di naman mahigpit dati) may chance na iblock ka na ng cloudflare pag napunta sa dnsbl/abuseipdb lalo sa mga naka static IP, same din yan sa wifi/local networks, may list din ng mga abusong mac address/devices pero di ganon kahigpit (kasi they assume your device may be tunneling the attacker).

so far. goods naman yung info ni TS, sharing is caring. sometimes we learn from mistakes and experiences, that's the häçker
 
di po advisable arp poisoning (these days), for education purpose only!

bad opsec po yan sa mga amateur.
mapupunta sa badness enumeration ang inyong device, yung apple devices may mitigations dito (protection frames, and automatic static arp entry/immunity) pero makikita nila (apple company) at matatandaan nila mga device na ginamit pang häçk, tapos kung may paymet apps ka pwedeng maalala or matugma nila ito (metadata, credit profiling).

kung pc naman kahit palitan/spoof mo pa ang mac naanounce padin ang ating original mac, tapos lilitaw yan sa ipv6 mac leakage which leads to detection again. bukod pa doon identified nadin ang inyong device at user location as per Exposure Notification. kung harmless naman or learning purpose on your own network goods pero sa mga nagbabalak outside, keep that in mind. ang mitigation dito is static arp entry pero need ito ng root sa ibang phone or set by manufacturer (sa ibang android) pero default mitigated by iphones/macs. Apple devs are aware of this issue kaya ginawaan nila ng auto static arp, randomized/auto-change mac upon detection, atbp. kasi flaw na LAN protocol ang arp attacks.

just like port scanning, ingat lang po kayo sa paggamit ng mga tools sa panahon ngayon. dahil minsan pag nag port scan (kahit di naman mahigpit dati) may chance na iblock ka na ng cloudflare pag napunta sa dnsbl/abuseipdb lalo sa mga naka static IP, same din yan sa wifi/local networks, may list din ng mga abusong mac address/devices pero di ganon kahigpit (kasi they assume your device may be tunneling the attacker).

so far. goods naman yung info ni TS, sharing is caring. sometimes we learn from mistakes and experiences, that's the häçker way.
yown oh more knowledge thanks 🫰
 
Thanks paps keep sharing
di po advisable arp poisoning (these days), for education purpose only!

bad opsec po yan sa mga amateur.
mapupunta sa badness enumeration ang inyong device, yung apple devices may mitigations dito (protection frames, and automatic static arp entry/immunity) pero makikita nila (apple company) at matatandaan nila mga device na ginamit pang häçk, tapos kung may paymet apps ka pwedeng maalala or matugma nila ito (metadata, credit profiling).

kung pc naman kahit palitan/spoof mo pa ang mac naanounce padin ang ating original mac, tapos lilitaw yan sa ipv6 mac leakage which leads to detection again. bukod pa doon identified nadin ang inyong device at user location as per Exposure Notification. kung harmless naman or learning purpose on your own network goods pero sa mga nagbabalak outside, keep that in mind. ang mitigation dito is static arp entry pero need ito ng root sa ibang phone or set by manufacturer (sa ibang android) pero default mitigated by iphones/macs. Apple devs are aware of this issue kaya ginawaan nila ng auto static arp, randomized/auto-change mac upon detection, atbp. kasi flaw na LAN protocol ang arp attacks.

just like port scanning, ingat lang po kayo sa paggamit ng mga tools sa panahon ngayon. dahil minsan pag nag port scan (kahit di naman mahigpit dati) may chance na iblock ka na ng cloudflare pag napunta sa dnsbl/abuseipdb lalo sa mga naka static IP, same din yan sa wifi/local networks, may list din ng mga abusong mac address/devices pero di ganon kahigpit (kasi they assume your device may be tunneling the attacker).

so far. goods naman yung info ni TS, sharing is caring. sometimes we learn from mistakes and experiences, that's the häçker way.
 
Back
Top