File Name: dSploit/zANTI2
File Submitted: 23 May 2015
dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assessments on a mobile device.
Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .
The WiFi scanner will show in green access points with known default key generation algorithms, clicking on them allows you to easily crack the key, supported models: Thomson, DLink, Pirelli Discus, Eircom, Verizon FiOS, Alice AGPF, FASTWEB Pirelli and Telsey, Huawei, Wlan_XXXX, Jazztel_XXXX, Wlan_XX, Ono ( P1XXXXXX0000X ), WlanXXXXXX, YacomXXXXXX, WifiXXXXXX, Sky V1, Clubinternet.box v1 and v2, InfostradaWifi.
Perform a traceroute on target.
A syn port scanner to find quickly open ports on a single target.
Performs target operating system and services deep detection, slower than syn port scanner but more accurate.
Search for known vulnerabilities for target running services upon National Vulnerability Database.
A very fast network logon cracker which supports many different services.
Craft and send a custom TCP or UDP packet to the target, such as Wake On LAN packets.
A set of man-in-the-midtle tools to command&conquer the whole network.
Redirect target’s traffic through this device and show some stats while dumping it to a pcap file.
Sniff passwords of many protocols such as http, ftp, imap, imaps, irc, msn, etc from the target.
Listen for cookies on the network and hijack sessions.
Kill connections preventing the target to reach any website or server.
Redirect all the http traffic to another address.
Replace all images on webpages with the specified one.
Replace all YouTube videos on webpages with the specified one.
Replace custom text on webpages with the specified one.
ARM: Your device must have an ARM cpu.
Gingerbread: An Android device with at least the 2.3 ( Gingerbread ) version of the OS.
Root: The device must be rooted.
BusyBox: The device must have a BusyBox full install, this means with every utility installed ( not the partial installation ).
This application is not to be used for any purposes other than to demonstrate its functions, and must only be used on networks for which you have permission to do so. Any other use is not the responsibility of the developer.In other words, don't be stupid, and don't direct angry people towards us.