Hacking someone’s Wi-Fi and sniffing their tasks is actually a cool thing to do but also it is illegal. Wireless networks are available to anyone within the routers broadcast area which makes it vulnerable for attacks. In this ethical hacking project, we are going to simulate a man-in-the-middle attack in a friendly network using dSploit android application. This project is for learning purpose only. Perform this simulation on your own Wi-Fi network
Ethical Hacking Kit will be shipped to you and you can learn and build using tutorials. You can start for free today!
What is a wireless network?
It is a network which uses radio waves to connect different devices and computers together. Since the wireless network is easily accessible for everyone most of the times it is protected using a password. Following are the authentication systems used to protect the network:
Wired Equivalent Privacy (WEP) - It encrypts the data transmitted over the network to prevent secret listening. It uses weak initial values which makes them vulnerable to attacks.
Wi-Fi Protected Access (WPA) - It is a security protocol developed to remove the flaws found in WEP. It uses 48 bits initial values for encryption which makes it less vulnerable.
Want to develop practical skills on Ethical Hacking? Checkout our latest projects and start learning for free
dSploit - It is a penetration testing suite developed for the Android operating system. Using this android application you can perform network mapping, password cracking, vulnerability scanning, Man-In-The-Middle (MITM) attacks and many more.
To install this application you need a rooted android smartphone with ARM CPU and android version 2.3 or higher.
To root your android mobile there are many videos available on youtube which will guide you in the rooting process.
MITM attack - With MITM you can intercept and perform a various attack over the target network with the help of following tools:
Install the dSploit android app in your mobile and give the root access. Now open the dSploit android application. Connect to a Wi-Fi network then select a target device on which you want to perform the attacks. You can able to see various modules available on the dSploit application. But for now, we are going to perform the MITM attack. Click on MITM.
Now you can able to see the above-mentioned tools. When you click on Redirect, one dialogue box will appear which will ask you to paste the address. Paste the IP address of the site which you want to redirect, then click OK. Similarly, perform all the attacks on the target device.
Skyfi Labs helps students learn practical skills by building real-world projects.
You can enrol with friends and receive kits at your doorstep
You can learn from experts, build working projects, showcase skills to the world and grab the best jobs.
Get started today!
Join 250,000+ students from 36+ countries & develop practical skills by building projects
Get kits shipped in 24 hours. Build using online tutorials.
Stay up-to-date and build projects on latest technologies