[Q] Usb tether for samsung galaxy s 4g T Mobile - Samsung Galaxy S (4G Model)

Im helping my father inlaw with his phone. T Mobile 3 days ago stopped his tethering. He was using an app called PDA Net. Now this has been working for the last year and a half dispite tmobile said it shouldnt have been working. Long story short his phone no longer tethers to his desktop via USB.
I upgraded to Gingerbread and have rooted the phone, still get tmobile crap saying he has to pay. Any ideas on my next time on how to get it working again.
THX Everybody!!
Phone is Samsung Galaxy S 4G SGH-T959V

Are you getting the message on your phone or your computer's web browser?

Some believe that a non-phone user-agent header is sniffed by T-Mobile
Posted from my SGS4G, thanks to Team Acid development

jeffsf said:
Some believe that a non-phone user-agent header is sniffed by T-Mobile
Posted from my SGS4G, thanks to Team Acid development
Click to expand...
Click to collapse
If you are saying they can determine non phone user agents - this is now true as of lately for me wifi tethering on ICS Audiophile. Experienced it for the first time last week. Never before had I. Searching XDA provided numerous threads of similar new-found blockage.

lumin30 said:
Are you getting the message on your phone or your computer's web browser?
Click to expand...
Click to collapse
When you browse on phone no problem, but when you plug in usb and start to tether and browse on computer. You get the TMobile message. Now the other thing is he can still use the tether and access his regions account and his paypal account from his computer. But email or google we get the message.

cuda352 said:
When you browse on phone no problem, but when you plug in usb and start to tether and browse on computer. You get the TMobile message. Now the other thing is he can still use the tether and access his regions account and his paypal account from his computer. But email or google we get the message.
Click to expand...
Click to collapse
Changing the user agent for his browser should avoid the blocked message.

lumin30 said:
Changing the user agent for his browser should avoid the blocked message.
Click to expand...
Click to collapse
Thx I will try that, what should I change it to and how does this stop his problem.. Thx Again!

People believe that T-Mobile is monitoring traffic and searching what your browser requests. The browser version and OS are typically sent in every request. You can make your own guesses about what other information about your traffic and content they are collecting.
Posted from my SGS4G, thanks to Team Acid development

Its been published what they monitor...its no secret and they aren't shy about it.
Everything is kept on record for a length of time,each carrier keeps different stuff for different amounts of time.

Related

Tethering Via WIFI & Videochat

Guys,
First of all I want to thank all of you for all of your hard work accomplishing TRUE TETHERING on the G1. It works flawlessly. THANKS!!! You guys are geniuses!!!
I have a question to ask with using tether-1.6.tar
Most of my programs I have that require internet access work all for one stinking video chat program I always use to chat with my family while I'm away on work assignment. It's a program called ISPQ. I can log into the program, and it pulls up the directories with all of the users signed in, and I can send quick messages, but when someone sends me a message the picture field is blank and in the directory when you click on a persons name to see their profile the picture area is blank as well. On their website it shows what ports you need opened for the program to run successfully as I'll post them down below. When I used to Tether with my TMO DASH the program always worked so I'm sure there is a way to get it working using the G1 tethered as well.
Thanks again,
Anthony
Port Number Protocol Direction Service
2000 TCP IN & OUT Video chat control
2001 TCP IN & OUT Video/audio data
2002 TCP IN & OUT Peer-to-peer Quick Message
80 TCP OUT Login, account info & profile viewing
2010-2030 TCP OUT Directory and Pal list
2000-2100 UDP IN Audio for hosted video chat sessions(not done automatically on some routers)
9800 TCP OUT Text chat for Interests and directory
aad4321 said:
as far as i know, i dont think their is a firewall on the phone it should already be opened. I have connected to my sling box which is some random port and it worked sucessfully.
Click to expand...
Click to collapse
Thanks for your response. Strange when I run the built in network utility in that program it DOES say it's detecting a firewall when there isn't. Probably a quick uninstall/re-install of the program should get it working properly. Everything else other then that single program works great. Streaming live video and audio works flawlessly as well. Amazing how this is true tethering and it blows the doors off of Tetherbot.
The people who got this all going are like god to me.
Yes! I also tether with this method, and it works flawlessly, I get 135KBpps down. And 85KBps up on edge, and on 3G I get around 900KBps down and 240ish up. It's funny though, after running a speedtest, it said my phone was located in kansas when I'm actually in cali, maybe its a ip address location error. But back to your situation, I haven't had any issues with ports on of the programs that required specific ports to function. =)
The location is correct, T-Mobile sends all their info through a proxy in kansas or some place back east, and that is why our speeds are sometimes slow.
neoobs said:
The location is correct, T-Mobile sends all their info through a proxy in kansas or some place back east, and that is why our speeds are sometimes slow.
Click to expand...
Click to collapse
Neoobs, Would that be the case in the Philadelphia area as well? I'm asking of this because if Tmo sends all of their info through proxy in this area as well, that's the reason why my videochat program isn't working properly (laptop/G1 Tethered).
Strange is that when I hook up my old Tmo Dash and tether it, ispq works fine but it's terribly slow running on Edge.
3G gets sent to a different proxy but both are sent through proxies.
I know there are some ways around it just not able to get the info right now as I am AFH
neoobs said:
3G gets sent to a different proxy but both are sent through proxies.
I know there are some ways around it just not able to get the info right now as I am AFH
Click to expand...
Click to collapse
I searched and searched with no results. There has to be a way around this. If I can video chat with the Dash Tethered to my lappy, there for sure has to be a way on the G1.
Neoobs,
Any word or source of a way around the 3g proxy/videochat with my post?
Thanks again......
Since TMO's 3g/edge connection goes through a proxy at the main how could I find out what Proxy IP and Port it is? In the program there is an option to log in through proxy so I guess I would need to know what's the proxy address they use for 3G in my area. Anyway I could find out?
It isn't like a software proxy, it is a hardware proxy, there is no info you can put in to get around it really. I will test this and see.
I can't find the info on how to get around it but I know I did because I was running programs (torrents) that were saying I was fully connected and even had someone remote into my PC while I was on it (was a friend) so nothing should be blocking it. BTW I was using openDNS servers maybe that is what helped.
neoobs said:
It isn't like a software proxy, it is a hardware proxy, there is no info you can put in to get around it really. I will test this and see.
I can't find the info on how to get around it but I know I did because I was running programs (torrents) that were saying I was fully connected and even had someone remote into my PC while I was on it (was a friend) so nothing should be blocking it. BTW I was using openDNS servers maybe that is what helped.
Click to expand...
Click to collapse
Open DNS Servers? Where would I add the values and what would they be? something like 4.2.2.1, 4.2.2.2?
neoobs said:
It isn't like a software proxy, it is a hardware proxy, there is no info you can put in to get around it really. I will test this and see.
I can't find the info on how to get around it but I know I did because I was running programs (torrents) that were saying I was fully connected and even had someone remote into my PC while I was on it (was a friend) so nothing should be blocking it. BTW I was using openDNS servers maybe that is what helped.
Click to expand...
Click to collapse
I'm about to beg you to download ISPQ and set it up (via Wifi Tether) and see exactly what I'm talking about. lol It's actually a pretty cool program and it's a free 21 day trial.
I will download it and get back to you in 24 hours.
Thank you so much!!!!
It all works fine for me, lets me log in and see others. What is the problem exactly?
Thanks for trying it out. I can log in but I can't see the user profile pictures in the directory and also when I receive a qm from someone the picture area is blank. All I can see is the text they sent in the message, not the picture..
Can you run the network diagnostic test in the programs options? Doesn't work here.
Can you see the users in the directories profile pictures and if someone qmed you, you can see their image along with the text?
I can see the users listed in the directories but no pictures of the users and the qms, I can read the text in the qm, just can't see the users image. Funny part of it all is I can successfully video chat in there and I can see the users video while video chatting. Your help with this is very appreciated. You can private me your response if you may.
Thanks again..

Uploading vids to youtube

Has anyone ever tried to upload a vid from the hero to youtube, only to get a "need wifi to upload a file of this size" type error? Is there a hack or a way we can get around that crap? Any ideas/help would be appreciated...
jerry43812 said:
Has anyone ever tried to upload a vid from the hero to youtube, only to get a "need wifi to upload a file of this size" type error? Is there a hack or a way we can get around that crap? Any ideas/help would be appreciated...
Click to expand...
Click to collapse
Post in the general section.. This section is for roms, rom hacks, dev work.
Jus10o said:
Post in the general section.. This section is for roms, rom hacks, dev work.
Click to expand...
Click to collapse
So modifying a apk to allow for larger uploads thru the cdma network doesn't count as a development question? I wasn't born yesterday, friend.
Keep in mind, the title of this forum is called "Hero CDMA Android Development
If you want a section for developing and modifying apk's ask the admins.
jerry43812 said:
So modifying a apk to allow for larger uploads thru the cdma network doesn't count as a development question? I wasn't born yesterday, friend.
Keep in mind, the title of this forum is called "Hero CDMA Android Development
If you want a section for developing and modifying apk's ask the admins.
Click to expand...
Click to collapse
apk's have nothing to do with available bandwidth.........It's a shame they don't, the devs here could probably get us high speed broadband......
chfields said:
apk's have nothing to do with available bandwidth.........It's a shame they don't, the devs here could probably get us high speed broadband......
Click to expand...
Click to collapse
Yeah I know they dont have anything to do with our amount of bandwidth we receive, what I am saying is that there's some apk, that has to do with sharing videos by uploading them to youtube, that sets some sort of limit on how big the file is allowed to be to be uploaded via the sprint network's internet. Once the limit is passed, it requests the file be uploaded via wifi internet. So, I thought I could be slick and try to do this setup:
USB tether to PC using pdanet,
Turn on Connectify (turns your wireless adapter into an adhoc network boradcaster, essentially allowing the PS3 to connect to wifi internet)
Then turn on wifi on the phone and connect to my PC's connectify.
Problem is, when you turn on Wifi internet it disables the sprint internet connection, so I was connected to a wifi 'hotspot' that had no internet.
Thought it was a good workaround but it screwed me in the end hahah.

HTC Peep

Seems that HTC is finally acknowledging Peep's vulnerabilities and while not publicly releasing an update, they will send it out to people who request it...
http://blog.taddong.com/2011/02/vulnerability-in-htc-peep-twitter.html
It's about time they got a fix out for it!
By the way, the Tweet for @xdadevelopers went out saying this was for Android users, instead of Windows Mobile users.
We have published an article regarding this situation on our Portal
http://www.xda-developers.com/android/htc-peep-vulnerability-update/
How did you find the vulnerability, is there a packet analyzing tool for android?
No luck
I just received a response from HTC saying they have no idea what I'm talking about. I just sent them back a response with the linked article. Hopefully someone can get the update from them and post it here so we don't have to deal with them at all.
So is this Windows mobile only, or Android too?
Sent from my HTC Desire using XDA App
Lothaen said:
So is this Windows mobile only, or Android too?
Sent from my HTC Desire using XDA App
Click to expand...
Click to collapse
I don't think Android uses Peep in its interface for Sense. I'm not 100% positive on that, but I know we've had an issue with this for WM for about five or six months now.
In trying to get a hold of this update, here are my responses from HTC so far for anyone interested.
Me said:
I just heard about the update to HTC Peep for Windows mobile users. I have an AT&T Tilt2 with Sense loaded on it. I was hoping you guys could send me the Peep update so I could use that tab again without worrying.
Click to expand...
Click to collapse
Kathleen said:
I understand how important it is for you to be able to update your Peep application. Unfortunately, we are not aware of an update for the Peep application. I have looked for the update and it is nowhere to be found. You will need to keep an eye on http://www.htc.com/us/support/tilt-2-att/downloads/ for updates for your device.
Click to expand...
Click to collapse
Me said:
I read about the security flaw in the HTC Peep tab back in August and never used it because of this. The Peep application discloses the username and password via a HTTP OAuth-related request during the initial sign in to anyone eavesdropping on the connection. It also exposes the username and password after the connection is established by having all of the requests from the mobile device to the Twitter service use a HTTP Basic authentication header even though the app is supposed to be using OAuth. For more information, please refer to this article: http://blog.taddong.com/2011/02/vulnerability-in-htc-peep-twitter.html
Click to expand...
Click to collapse
Lindsay said:
We have not made an official update, any updates found on 3rd Party websites are up to you to do the research and download yourself. Just know these updates are considered rooting on your Tilt 2, so make sure before you update you do the research.
Click to expand...
Click to collapse
Me said:
Then when will the update be made public? It is kind of a pain that I've waited for six months now to use a feature of this device because of a security issue. Also, how would this be considered rooting since I'm not using an Android device? Windows Mobile users have administrator-like privileges by default in this operating system. There is no such thing as rooting on a Windows Mobile device.
Click to expand...
Click to collapse
Lindsay said:
If you re-write the ROM it is considered rooting. If you can add any applications to the SD Card and install it to the device, that is not rooting. We do not have any information on any updates available for your device at this time. I apologize that we do not have any updates for HTC Peep.
Click to expand...
Click to collapse
Me said:
I don't mean to sound insulting, but rooting is not the same as flashing a custom ROM. Rooting is gaining root-level administrator privileges on a Linux based operating system. Windows Mobile provides this access to the user by default. There is no other setting for this. Android, being a Linux based distro, does not come with root privileges installed to protect itself from users inadvertently messing around with things they shouldn't. It is the same thing on desktop operating systems like Ubuntu, Fedora, and the like. Rooting is completely different from flashing a custom ROM, as you are suggesting. Either way, an updated Sense tab using HTTPS, as it originally should have done, would be as simple as installing a *.cab file. My question, then, becomes to whom should I address this issue to get further support should I decide to call about it with the information I have?
Click to expand...
Click to collapse
Lindsay said:
The fact is we do not have an update for your device at this time. I apologize for this, but at this time we do not have any updates.
Click to expand...
Click to collapse
Me said:
Yes, you mentioned that. I asked whom I should voice my concerns with since this is the case. I understand that you don't have any information to offer me. I wasn't questioning that. I would simply like to know where I should go from here as there has been a serious security flaw in this device for quite some time. I do not mean to insult you, if I have done so, and apologize if I have, but I want this matter resolved once and for all. Obviously, the users are not allowed to modify the HTC Sense code or this would have been resolved some time ago. If some users were allowed the Peep source code, this could be rectified very quickly with the SenseSDK, but as that isn't an option, I, and several others, look to HTC to provide support for their product and software. If it is simply a problem of my device becoming outdated, then the HTC HD2 (Leo_512, Leo_1024) has the same problem on the latest ROM image as well.
Click to expand...
Click to collapse
Lindsay said:
I have sent the forum you sent me to the appropriate department for review. If you would like to troublahoot you device I would be glad to further assist you, but at this time this email will need to be closed if there is no troubleshooting to be done on your device. Again, I have sent the forum to the appropriate department.
THREAD CLOSED
Click to expand...
Click to collapse
It doesn't look like HTC is playing ball here. I'm going to continue to try to figure this out as I would love to actually be able to use the Twitter tab for a change. I never really used it because of the security flaw that was found.
i contected taddong and they told me
yeah they told me they had no idea what i was talking about....i contacted "tadong" and they told me to sedn the link from there site regarding the issue to HTC and he would handle them if they wanted more info on it...i guess we'll see what happens
It doesn't look like HTC is playing ball here. I'm going to continue to try to figure this out as I would love to actually be able to use the Twitter tab for a change. I never really used it because of the security flaw that was found.[/QUOTE]
Uh... "If you can add any applications to the SD Card and install it to the device, that is not rooting."
Under that logic, if unrevoked forever ever releases a .apk to turn S-OFF, does that imply that merely doing that to get root access isn't rooting?
edit: this is what happens when companies aren't smart enough to release some kind of auto-app updater, separate from OTA updates. Stuff like this takes an eternity. How hard is it to add an "s" to the http of the authentication? (for that matter, why the hell is Twitter letting you log in this way in the first place?)
lol, first thing i thought of when i saw this posts title...
http://my.starstream.net/neobigd/htc_peep.jpg
HTC finally release the Peep security update for the Rhodium, Topaz, Leo, and Photon. I've attached the files to this post, but they can also be had at HTC's website at the link below.
HTC Peep security update
EDIT: These updates do not work with custom ROMs, it seems. The *.exe needs to be copied to your device and run from there. I'm working on extracting them and making proper *.cabs now.
Peep Update *.cabs
EDIT: DO NOT PM ME ABOUT THIS FIX. IT DOES NOT WORK.​
Please do not PM me about this security fix. It has nothing to do with the current Twitter outage as of the beginning of May 2011.
After pulling them apart and recompiling them, with the help of JVH3, here are the HTC Peep Update *.cabs. These are for Windows Mobile users with version 6.5 or higher. It should work, in theory with version 6.1, but I didn't feel like testing it out. Obviously, you'll need Sense 2.5 as well. There are four versions, but they all seem to be exactly the same. I didn't notice any differences other than the dates they were packaged. The Rhodium version seemed to have a slightly smaller TwitterApp.exe file, but I still don't think it was different.
Disclaimer: I take no responsibility for anything you do to your devices. These are posted for informational purposes. If you choose to install the application update, then any side effects (of which there should not be) are on you.
Changes​
This update changes the way the Twitter Tab (HTC Peep) authenticates your user account. Before this update, your account information is sent via unencrypted http headers upon login which reveal both the username and password to anyone who happens to be eavesdropping on the connection, whether it is by cellular data or wifi as seen below.
Code:
authenticity_token=c8b5abaf53f223e827d9258ddfef4285a816db5f&
oauth_token=I4FK956n1foaHjayLKXJT2IaBpsmoo0amKyPhebc&
session%5B[B]username_or_email%5D=USERNAME&session%5Bpassword%5D=PASSWORD[/B]
Also, when sending tweets or receiving them, their is a continuous authenticate request sent which exposes the username and password again as illustrated below.
Code:
GET /statuses/friends_timeline.json?count=50&page=1 HTTP/1.1
Accept: text/xml, application/xml;q=0.9, */*;q=0
[B]Authorization: Basic BASE64("USERNAME:PASSWORD")[/B]
User-Agent: TwitterEngine
Host: twitter.com
I haven't been able to confirm the status of the current update yet with traffic monitoring, but according to HTC, this update sets the Peep application to use OAuth to establish a connection with https to encrypt the username and password instead of leaving it exposed for all the world to see.
EDIT: This is not a 100% fix. It seems that while the initial session is now being sent over https using TCP port 443 (sending against the api.twitter.com domain), during the rest of the session, Peep switches back to HTTP basic. This still leaves the whole session after the initial login vulnerable to hijacking based on the Twitter's session ID through cookies. I suggest using a different Twitter client, as neither HTC nor Twitter care for our aging devices.
EDIT: DO NOT PM ME ABOUT THIS FIX. IT DOES NOT WORK.​
i dont like to install os on sd card
squaloforte said:
i dont like to install os on sd card
Click to expand...
Click to collapse
What relevance does your post have to anything related to this thread?
Nothing about this thread has anything to do with installling an os or anything to your sd card.
It is about the twitter tab security flaw and the recent patch by HTC.
A patch could only be installed to the device, since patches need to replace files on the device.
Still getting login error!
I'm still getting login error problem on my HTC HD2 o2 uk phone, this update and the HTC HD2 Peep Security update on the HTC website http://www.htc.com/europe/SupportViewNews.aspx?dl_id=1085&news_id=866 doesn't work
Is anyone else getting this problem?
ramonguthrie said:
I'm still getting login error problem on my HTC HD2 o2 uk phone, this update and the HTC HD2 Peep Security update on the HTC website http://www.htc.com/europe/SupportViewNews.aspx?dl_id=1085&news_id=866 doesn't work
Is anyone else getting this problem?
Click to expand...
Click to collapse
Please try to keep up.
This fix has nothing to do with login errors.
This fixes a security vulnerablity.
Without the fix, user name and password are sent in plain text through http.
With the fix, oauth is used instead, so each request does not send this information. And when it initially is sent to authenticate, https is used.
The twitter tab works for just about everybody. And the fact that no one else is reporting problems since applying the fix indicates that the fix does not have a problem.
Things to check:
Do you have a twitter acount?
Are you entering your twitter user name and password correctly?
Is your twitter account locked by twitter? (try using it with your computer)
Do you have a data plan?
Do you have a strong cell signal with Edge or 3G service?
Have you tried soft resetting your device?
Are you in the UK?
If not, does the country you are in block access to twitter?
Can you browse web pages with your phone?
No need to reply to this reply to your post since your post was not on topic for this thread.
JVH3 said:
Please try to keep up.
This fix has nothing to do with login errors.
This fixes a security vulnerablity.
Without the fix, user name and password are sent in plain text through http.
With the fix, oauth is used instead, so each request does not send this information. And when it initially is sent to authenticate, https is used.
The twitter tab works for just about everybody. And the fact that no one else is reporting problems since applying the fix indicates that the fix does not have a problem.
Things to check:
Do you have a twitter acount?
Are you entering your twitter user name and password correctly?
Is your twitter account locked by twitter? (try using it with your computer)
Do you have a data plan?
Do you have a strong cell signal with Edge or 3G service?
Have you tried soft resetting your device?
Are you in the UK?
If not, does the country you are in block access to twitter?
Can you browse web pages with your phone?
No need to reply to this reply to your post since your post was not on topic for this thread.
Click to expand...
Click to collapse
My Peep app stop working in January, there are no problems with my twitter account, all I'm looking for is a solution or fix!
Do you know where i can get a Peep.cab?
ramonguthrie said:
My Peep app stop working in January, there are no problems with my twitter account, all I'm looking for is a solution or fix!
Do you know where i can get a Peep.cab?
Click to expand...
Click to collapse
As I previously said, this thread is dedicated to the HTC Security Patch for the twitter tab.
I suggest either looking for a thread dedicated to the twitter tab not working or creating your own thread in the question and answer section.
http://forum.xda-developers.com/forumdisplay.php?f=456
This thread is not the appropriate place for your question.
My HTC Peep stopped working on my Rhodium after installing this update. Peep worked right up until I installed the HTTPS Fix.
Verizon TP2, using the Custom ROM --> Verizon MR2 Fixed by Mr. X
(ROM Found here)
http://forum.ppcgeeks.com/cdma-tp2-...zon-mr2-fixed-mr-x-boots-unlocked-device.html
I see the "Tap Here to Authenticate" Screen
I type in Username/Password (which works when logging into the website)
HTC Peep tries to log in, but I get an error --> "You entered an incorrect username or password."
I cleaned out the Temp folder to try and get a fresh start, but no luck.
I tried to uninstall, but I am unable to uninstall properly.
I tried to Re-install, but no luck.
I shut down Sense, re-installed, and rebooted and turned on Sense, no luck.
So, minus doing a brand new ROM flash it looks like this .CAB tanked the Twitter tab for me. I didn't really want to keep using it unsecured, but it sucks that the update stopped it from working altogether.

WhatsApp Sniffer issue

Hi guys,
I downloaded WhatsApp Sniffer in my HTC Desire, it seems to be working but can't capture any conversation. In short, when I start the app, I can only see the following message:
"There isnn't any conversations yet, wait until one has been captured. Make sure WhatsAppSniffer is listening and if you are on a WPA/WPA2 network, check that the ARP_Spoof is activated."
I've tried the app in both WEP and WPA/WPA2 networks but no luck. My phone is rooted with:
Android version: 2.3.7
Mod Version: CyanogenMod-7-11162011-NIGHTLY-Desire
WhatsApp Messenger: 2.7.8509
Any clues what might be the reason?
Thx,
Sotiris.
I thought Whats App was now fixed so that it did not send plain text.
Hmm, I am not aware of it. But it makes sense... Thx for your reply.
if your network is secured with Wpa or wpa2
the chat will not be captured
to capture chat the network must be protected with wep
or it need to be unsecured
Pl provide link to download
alinawaz said:
Pl provide link to download
Click to expand...
Click to collapse
can someone send me (PM me) a working link to whatsapp sniffer, please?!
https://docs.google.com/open?id=0B_PzeJyBdcp3UW5GOVZlOTZKYVU - google drive link cause i dont use any other servers
pransh said:
https://docs.google.com/open?id=0B_PzeJyBdcp3UW5GOVZlOTZKYVU - google drive link cause i dont use any other servers
Click to expand...
Click to collapse
thank you!
Hello all am new @ this site, awesome site... am using whatsapp sniffer or @ least am trying too...
my issue is that @ times it says that ( my devise seem not to be rooted ), I have rooted phone i do have the superuser icon... samsung GS3
and i restart the app, and it runs ok, but it don't capture anything... am i doing something wrong??? i do see that it will not
capture anything in wap or wap2...
any help will be appreciated
bumping because it seems that this app doesnt work (anymore)
anyone confirming?
Hi.
I'm also wondering the same thing. Just went through the fairly painful process of downgrading my HTC Desire Z Gingerbread to Froyo in order to then gain root, specifically so that I could use WhatsAppSniffer.
The app seems to have installed correctly, it's running fine, the other apps like SuperUser and BusyBox have no problems. I've run the sniffer for several hours on my shared WPA network at home, and for a couple of hours on a shared Open network last night with no results. It could very easily be the case that there were no conversations to capture, but the other possibility is that WhatsApp have fixed the vulnerability. I'm going to keep trying for a couple more days, and on one more network connection. Will confirm if whether or not I get anything here.
Just reading a couple of open-source articles it seems that WhatsApp pushed release 2.8.3 to iPhones on 27th August 2012, and a similar release to Androids around the same time. This release included (relatively poor) encryption. Anyone who has downloaded the update will now be protected from WhatsAppSniffer. Seems that sniffing is still possible if you can fathom this: ezioamodio.it/?p=29. It's beyond me though. #noob
I tried yesterday found on web the versione 1.03 donate root,
also for myself it seems doens't work,
the spoof says that if I'm scanning a WPA/WPA2 network I have to activated the ARP Spoof, otherwise for WEP it doens't need.
But I supposed it worked in one of the two cases, instead the app continue to search but see nothing.
I tried to send a whatsapp message connecting to the same network that sniffer is connecting too, and it see even not my message.
Is it an older version that doesn't work or maybe it needs a rooted phone and mine one is not?
THANKS
pransh said:
https://docs.google.com/open?id=0B_PzeJyBdcp3UW5GOVZlOTZKYVU - google drive link cause i dont use any other servers
Click to expand...
Click to collapse
Google removed it, can you give another link?
FardeenTGO said:
Google removed it, can you give another link?[/QU
same here too
Click to expand...
Click to collapse

[GUIDE] How to bypass T-Mobile's tether block using Firefox

Hello everyone, so I recently finally got blocked from tethering by T-Mobile after a long time of sucking it out of them by being rooted and on a custom ROM like all of us here.
The way they know you are tethering on their network is by the User Agent that is sent to them by your desktop/laptop computer browser. When they see that a regular browser is accessing their network, that's when you get the infamous T-Mobile Hotspot Screen we all hate.
I've recently discovered a Firefox Add-On called User Agent Switcher found here: https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/?src=search
Download it and install it to Firefox. Then download this (right click, "Save as") http://techpatterns.com/downloads/firefox/useragentswitcher.xml
Go to Tools>User Agent>Edit User Agents (a window pops up) click on "Import.." and add the .xml file you just downloaded.
Then pick a User Agent that resembles the Sensation webkit and BAM! Free tethering for all of us.
I'm using it right now
NOTE: If you use a Googlebot User Agent, you will be able to tether and always load up full webpages instead of mobile versions. - Thanks to The Archangel and chadwick3nser for discovering this!
You can also do the same with chrome.
Been doing it for since the day they released it.
The Archangel said:
You can also do the same with chrome.
Been doing it for since the day they released it.
Click to expand...
Click to collapse
Hell yeah, go Chrome! I've never used it so I wouldn't know
FiddleGoose said:
Hell yeah, go Chrome! I've never used it so I wouldn't know
Click to expand...
Click to collapse
I actually take it one step further an either completely hide my IP on the computer or switch it so they can't try to block it.
Nice!
Is that how att detects also?
Sent from my SAMSUNG-SGH-I747 using xda premium
They detect by sniffing packets an the extra Mac address
The Archangel said:
They detect by sniffing packets an the extra Mac address
Click to expand...
Click to collapse
Damn, AT&T is on point. Bastards.
I hate T-Mobile for pulling that move as well.
FiddleGoose said:
Damn, AT&T is on point. Bastards.
I hate T-Mobile for pulling that move as well.
Click to expand...
Click to collapse
just about every major cell company does the exact same thing to detect it. Maybe different variants but still the same.
I am doing this right now as well, but all the desktop pages are in mobile. I have found the desktop button on the bottom of the youtube site but cant find it on most sites. any workaround for this?
chadwick3nser said:
I am doing this right now as well, but all the desktop pages are in mobile. I have found the desktop button on the bottom of the youtube site but cant find it on most sites. any workaround for this?
Click to expand...
Click to collapse
Use a Google spider UA. Everything will be as normal
The Archangel said:
Use a Google spider UA. Everything will be as normal
Click to expand...
Click to collapse
do i create a custom UA and edit the string to a spider or how would be the best way? or what would be the best one to use?about going about this? sorry, have no experience with user agents
---------- Post added at 05:54 PM ---------- Previous post was at 05:43 PM ----------
nevermind, i used googlebot 2.1 new version and its working great, thanks for this!!!
Glad you got it working.
Hey op. Heres a suggestion, put in the your first post. Use a Google bot user agent. Using that will load all the web mail pages normally.
The Archangel said:
Glad you got it working.
Hey op. Heres a suggestion, put in the your first post. Use a Google bot user agent. Using that will load all the web mail pages normally.
Click to expand...
Click to collapse
You got it!
The Archangel said:
I actually take it one step further an either completely hide my IP on the computer or switch it so they can't try to block it.
Click to expand...
Click to collapse
What are you using to block the IP address? I was thinking just changing the IP to not be the standard DHCP that the phone would give you still shows it coming from another MAC address on the same connection and would be obvious to the write sniffing rules?
I realize this isn't a requirement I've been using the UA for a while from canary but I easily see them stopping this workaround w/ better sniffing rules.
SurfCityCom said:
What are you using to block the IP address? I was thinking just changing the IP to not be the standard DHCP that the phone would give you still shows it coming from another MAC address on the same connection and would be obvious to the write sniffing rules?
I realize this isn't a requirement I've been using the UA for a while from canary but I easily see them stopping this workaround w/ better sniffing rules.
Click to expand...
Click to collapse
i use platnium hide ip. it switches to another ip when im on windows an sometimes ill use smac to change that also. havent found any programs for linux yet (havent really looked)
The Archangel said:
Use a Google spider UA. Everything will be as normal
Click to expand...
Click to collapse
This is a very bad advice as pretending to be a googlebot may get you either blocked or banned from many websites (especially if they use ZBBlock) as this behavior is rated as a spammer/bot activity.
tobitege said:
This is a very bad advice as pretending to be a googlebot may get you either blocked or banned from many websites (especially if they use ZBBlock) as this behavior is rated as a spammer/bot activity.
Click to expand...
Click to collapse
I've been doing it for a while, never got a ban on my end
Okay I've been tethering fine for a while on FF, but T-Mobile finally blocked me yesterday... I figured out that it was the second I started to watch a YouTube video. Guessing they're able to see activity on my cell account at the same time as my login is accessing YouTube and put 2&2 together...? (That may be obvious to some...)
Anyway... I may try the user agent spoofing but this is really aggravating since I'm traveling right now and the internets in my hotel are $10/day.
Sent from my Galaxy S 4G
Anyone figure out how to use netflix while spoofing in Firefox? I've been settling for Amazon Prime instant video, but I'd love to have Netflix back. With the UA spoof, Netflix won't play movies. At least I haven't figured out how.
This method no longer works for me

Categories

Resources