I can't understand how the facesniff, which is an Android application, can open
an interface e.g. WIFI and realise sniffing -
network monitoring without being run as root or having system priviledges. To do so,
an Android application should be
signed with the platform's key : http://stackoverflow.com/questions/6...s-root-android
How is this possible?? I am really wondering about that. Some time ago I tried to port
jNetPcap, so as to use it in an Android application for monitoring the WIFI. I successfully
ported it but I couldn't read the list of Android interfaces from its API and realise web
monitoring.. (see here for details: http://stackoverflow.com/questions/5...alldevs-method
I am really wondering how faceniff faces this problem??
e.g. Shark for Android runs an instance of libpcap in the background and derives the
appropriate information from the pcap traces..
What faceniff do to get the information it wants, e.g. the web sessions?? I am
really curious about that.. Any ideas?