Mastodon IzzyOnDroid


Say thanks!
Privacy Links
↓ Your product here? ↓
Rory Price: Opt OutThey say that rumors regarding spying on their users and manipulating them are nothing but baseless accusations and pure fabrications. But can they be believed?A fascinating SciFi novel with plenty of references for those who know… (libre ePub)Rory Price: Opt Out
They say that rumors regarding spying on their users and manipulating them are nothing but baseless accusations and pure fabrications. But can they be believed?
A fascinating SciFi novel with plenty of references for those who know… (libre ePub)
 
Das inoffizielle Android-HandbuchDas inoffizielle Android-Handbuch
Buy at Amazon for €16.99
Steganographic Dynamic Knock Sequence for Combating Port Scan Attacks: Addressing Vulnerabilities in Open Network Ports using Port KnockingSteganographic Dynamic Knock Sequence for Combating Port Scan Attacks: Addressing Vulnerabilities in Open Network Ports using Port Knocking
Buy at Amazon for €47.23
The Test Access Port and Boundary Scan ArchitectureThe Test Access Port and Boundary Scan Architecture
Buy at Amazon for €20.76
Hacking & Security: Das umfassende Hacking-Handbuch mit über 1.000 Seiten Profiwissen. 2., aktualisierte Auflage des IT-StandardwerksHacking & Security: Das umfassende Hacking-Handbuch mit über 1.000 Seiten Profiwissen. 2., aktualisierte Auflage des IT-Standardwerks
Buy at Amazon for €49.90
The Boundary-Scan HandbookThe Boundary-Scan Handbook
Buy at Amazon for €80.00
Modelling the Queue at the Scan Station of Tema PortModelling the Queue at the Scan Station of Tema Port
Buy at Amazon for €27.64
Snort Cookbook.Snort Cookbook.
Buy at Amazon for €35.99
Recent Advances in Intrusion Detection: 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers (Lecture Notes in Computer Science (3858), Band 3858)Recent Advances in Intrusion Detection: 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers (Lecture Notes in Computer Science (3858), Band 3858)
Buy at Amazon for €57.40
As of 2021-01-16 16:24
prices & availability might be subject to change.
StatsPermissionsConcernsSearch apps by category and permissiondehelp

Sniffer, Spoofer & Portscanner

It's not necessarily an evil intention behind these actions: it's fully legit to check your own network for possible vulnerabilities. Maybe some intruder is already inside? Or there's some service running that shouldn't be? Did the admin forget to close some port in the firewall?

From scanning foreign networks without explicit permission you should refrain, though. Not only this could trigger some (false?) alert (as nobody would have expected your action), but also could have legal consequences. Oh: and don´t forget to be aware of „sniffers“ riding piggy-back on the apps (ad/analytics modules calling home) ;)

In case those words don't mean anything to you, some short explanations:

Network Sniffer

2021-01-06

Network Spoofer

2021-01-06

Port Scanner

2021-01-06

Protection agains WiFi attacks

2021-01-07

Further Readings:

2021-01-12