Step by Step
Step 01:- Download Dsploit Apk
Here
Step 02:- Your Device must be rooted before installing dsploit.(i have explained how to root root android using odin in my
older post.
Step 03:- Install dsploit on your device.
Step 04:- When you start up dSploit, it will immediately start listening on the wireless network you’re connected to. Depending on the hardware available, this may affect the responsiveness of your device. You can tap on the menu and then on “Stop Network Monitor”.
Step 05:- You can tap on the Wi-Fi signal icon to see which networks are visible. You can click on a network to connect. If it is a ‘secured’ network that is vulnerable to one of the cracking techniques available, it will be flaggedas green, identifying it as such. Clicking on that network offers you the options of either connecting or cracking.
Step 06:- you may want to check on is how packets are being routed within your own network. Clicking on a target machine will bring up a menu of applicable tools. You can click on the Trace tool to follow how packets move around within the network.
Step 07:-"Port scanning"The first step when a ‘bad guy’ tries to compromise your system is to knock on your virtual door with a port scan. In dSploit, you can do this by tapping on the Port Scannertool after selecting a host to test.
Step 08:- Once you get the list of open ports, you can click on them to try to connect. If it is a port used for web traffic, it will try to open it in a browser. Otherwise, it will try to open a connection using Telnet.
Step 09:-"Inspector module"The Inspector module does some further probing to get an idea what operating system is running on the host, along with what kind of services are running on the open ports. This may take several minutes to complete, so be patient.
Step 10:-"Vulnerability Finder"Now that you know what the OS is, and which ports are open to connections, you need to check to see what problems may be affecting this particular system. Again, these checks can take several minutes, so be patient. The total list is ordered according to severity.
Step 11:-"More vulnerabilities"The original list provides a short description of the vulnerability, but often this is not enough. Clicking on the vulnerability of interest will open the associated webpagefrom the National Vulnerability Database, hosted by the NIST. Here you can get more information on just how serious it may really be.