Author Topic: Sniffing domotica  (Read 940 times)

0 Members and 1 Guest are viewing this topic.

Offline evildoc

  • NULL
  • Posts: 3
  • Cookies: 0
    • View Profile
Sniffing domotica
« on: February 02, 2016, 02:20:12 am »
Goodtime,

It's been a while, hope everyone is doing great.

Recently I purchased a domotica device which at first use has to be activated. The steps required where:

1. Connect to a 2.4 Ghz WiFi network
2. Enter your serialnumber + activation code
3. It prompts you with your info for you to check ( if correct > next step)
4. Activate

The idea crossed my mind to see if I can sniff traffic from this device. So far  I've only been doing research on howto and this is what I want to do.

1. Setup fake AP (kali/airbase)
2. Connect the device to the fake AP
3. Sniff

Step 1 |  I know a dhcp-server is required, which is a pain to setup from what I remember. I also have an Alfa card.
Step 2 |  Shouldn't be difficult
Step 3 | Not sure what software to use to sniff http/https. ( I don't even know what protocol the device uses ). Most likely the traffic is encrypted so also sslstrip.


Guys what I'm I missing ? Any tips/tricks ?

thanks a bag