Security
Brought to you by

How To Protect Yourself From dSploit And Other Wi-Fi Hacking Apps

It’s not paranoia: Using public or open Wi-Fi networks without taking your security into consideration is a bad idea. We’ve shown you how easy it is to break into those networks, and how to stop it from happening to you. Now, dSploit, a security toolkit for Android, makes that process so simple anyone can do it. Here’s how it works, and how to protect yourself.

Photos by bloomua (Shutterstock)

What Is dSploit?

dSploit is actually a suite of security tools bundled together in one application. It runs on rooted Android (2.3+) devices, its code is freely available at GitHub, and it’s actually a great utility if you’re a security professional or otherwise enjoy the ins and outs of network security, hacking, and penetration testing.

We want to be clear that we’re not demonising the tool here; unlike apps such as Firesheep, Faceniff and Droidsheep, dSploit isn’t made for the sole purpose of cracking networks or hijacking user sessions.

It can certainly sniff out passwords transmitted in plain text on an open network, and it can crack poorly secured Wi-Fi networks. It can also scan networks for vulnerabilities, crack keys on common routers, and hijack browser, website or social network sessions and hold on to them. You can see a full list of the tool’s features here.

For a security professional, an amateur looking for an affordable way to learn more about network security, or someone looking to protect their own network, dSploit can be a valuable resource. It can also be exploited by people looking to steal your data. That’s why we’re going to talk about how it works and how you can protect your passwords and private data from anyone else using it.

How dSploit (And Other Apps Like It) Work

dSploit makes it easy to do two things: sniff out passwords which are being sent in unencrypted form, and hijack active browser sessions so you can masquerade as someone who is already logged in to a site or service. In both cases, they’re really one-touch operations once you have the app installed.

Sniffing out passwords is easy to do. If someone is visiting a site, or logging in to a service without using HTTPS or SSL, your password is likely being sent in clear text. Anyone sniffing packets on a network can capture them without having to do any real kind of packet inspection, and once they have it, they’ll try it on as many sites and services as possible to see if you use it for other accounts. The video above, from OpenSourceGangster, explains how the app works in detail, and how to use it.

Browser hijacking is a bit more intricate. If you’re not familiar with session hijacking, it’s the process of capturing cookies to exploit a valid active session that another user has with a secured service in order to impersonate that other user. Since no sensitive data such as a login or password is transmitted in the cookie, they’re usually sent in the clear, and in most cases they’re used by web sites and social networks as a way of identifying a user with a current session so the site doesn’t forget who you are every time you reload. This is the most common attack vector for apps that sniff out passwords and sessions via Wi-Fi. We showed you how this works when Disconnect, one of our favourite privacy protecting browser extensions, added protection against widget jacking and session hijacking, if you want to see an example.

dSploit approaches session hijacking in a similar manner to the other tools we’ve mentioned. The folks over at MakeUseOf explain how the app works in further detail, including some of the things you can do with it. Some web sites simply encrypt your username and password, and once that handoff is made, everything else is unencrypted. While many sites have moved to HTTPS (and there are tools to help that we’ll get to a little later), most require you to activate their HTTPS features. Many other sites haven’t bothered moving to HTTPS at all.

What’s The Real Risk Here?

The real risk from tools like this varies. The odds of you encountering someone in your local coffee shop running dSploit, Firesheep similar apps to capture passwords and hijack sessions is pretty slim, but as we’ve mentioned, it only takes one person to ruin your day.

Someone could just capture as many Facebook or Twitter sessions as they can (after which they can change a user’s password and keep the Facebook account for themselves), hijack Amazon shopping sessions and grab address and credit card information, read your email and chats, and so on. The risk goes up with more and more tools available that are easy for anyone to use, and with the number of people out there who simply don’t protect themselves by encrypting their data.

How Can I Protect Myself?

Protecting yourself from these tools like it is actually remarkably easy if you put in the effort:

It doesn’t take much to use HTTPS everywhere you can, fire up a VPN if you’re going to be working from the library, or just not to use public Wi-Fi and wait until you get home or tether to your phone instead. If everyone took these steps, unscrupulous use of tools like these wouldn’t’ be an issue and only the people who needed them would use them. However, as long as they’re so effective, it makes sense for you to take the necessary steps to protect yourself.


Have you subscribed to Lifehacker Australia's email newsletter? You can also follow us on Facebook, Twitter and YouTube.