Termux is an increasingly popular tool, as it is accessible to almost any user interested in programming and has a lot of complementary tools. This time, ethical hacking experts from the International Institute of Cyber Security (IICS) will show you how to create a sniffer in Termux without requiring root user permissions.
As usual, we remind you that this article was prepared for informational purposes only, so IICS is not responsible for the misuse that may be given to the information contained herein.
For those users unfamiliar with the term, remember that sniffer refers to a computer program capable of intercepting information and capturing traffic from the target system. According to experts in ethical hacking, this software captures any data flow and, if necessary, decodes the information and stores it sequentially.
The sniffer will create a fake SSDP device (UPnP) with which they can trick the target system into sending the desired information to the malicious location, keeping a detailed record of the victim’s activities. Let’s see how to use the tool presented on this occasion.
pkg update pkg upgrade
Next, we install the packages we need: Git and Python.
apt install git -y apt install python -y
Now we balance the instrument itself
git clone https://github.com/initstring/evil-ssdp cd evil-ssdp
Next we will launch the tool:
python evil_ssdp.py eth0
The installation process will continue. In case you require help to use the tool, experts in ethical hacking recommend using these commands:
These are all the commands needed to familiarize you with the tool. Ethical hacking experts recommend trying them out for a better experience.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.