An ad blocker that uses the hosts file. The hosts file contains a list of mappings between hostnames and IP addresses. When an app requests an ad, that request is directed to 127.0.0.1 which does nothing. There are options to run a web server to respond to blocked hostnames and to direct requests to the IP address of your choosing. You can download hosts files from the app but it is possible to use your own and to add certain sites to the white- and black-lists.
stympy said:
An ad blocker that uses the hosts file. The hosts file contains a list of mappings between hostnames and IP addresses. When an app requests an ad, that request is directed to 127.0.0.1 which does nothing. There are options to run a web server to respond to blocked hostnames and to direct requests to the IP address of your choosing. You can download hosts files from the app but it is possible to use your own and to add certain sites to the white- and black-lists.
Click to expand...
Click to collapse
Does this require root?
Dark_Horse said:
Does this require root?
Click to expand...
Click to collapse
Yes.
Sent from my Lenovo P780
Related
Hi all,
is it possible to run an internal DNS server on Android? I am looking for a solution similar to bind9 on Linux (e.g., h**p://ubuntuforums.org/showthread.php?t=236093) that allows to define DNS zones, i.e., all DNS requests are first of all redirected to 127.0.0.1 and then forwarded based on the predefined DNS zones.
Unfortunately, I didn't find aything about this, so I was wondering if it's possible at all in Android?
Thanks,
Chris
Hi Everyone,
I have a question regarding these Ad Blocking programs. I see that they primarily work by adding entries in the Hosts file for IP resolution (usually the loopback address 127.0.0.1) for known Ad addresses. So my question is this... Is it possible for hackers to produce a fake (or partially legit) product that could be used for Phishing? They could inject IP addresses for banking, ecommerce, etc., websites to be directed to their fake sites.
Any thoughts?
Thanks!
Dagoof
You mean do something like redirect Wells Fargo to a copycat site to phish usernames, passwords, CC#'s etc? It's certainly possible. It'd be a pretty limited audience hack though. You'd still probably do better just sending a mass email.
I spoke with the author of Adfree and his program implements checks on the downloaded host files to ensure they only point to 127.0.0.1 unless specified in the options.
esheesle said:
I spoke with the author of Adfree and his program implements checks on the downloaded host files to ensure they only point to 127.0.0.1 unless specified in the options.
Click to expand...
Click to collapse
Yeah... I thought that the easy way to rest assured was to go through the hosts files to be sure all the entries point to the loopback address...
Thanks!!
Hello!
I need to sniff web traffic from application googleservicesframework.apk when it is login and register(ssl). How can I do it on my pc?
gogus said:
Hello!
I need to sniff web traffic from application googleservicesframework.apk when it is login and register(ssl). How can I do it on my pc?
Click to expand...
Click to collapse
If you route the traffic from your Android via your PC to the Internet, you can of course sniff the traffic using tcpdump or wireshark, but since it is SSL encrypted, it won't make any sense anyway. You can only see the presences of traffic, not what it is or the contents.
Is there a way to decode SSL from google?
gogus said:
Is there a way to decode SSL from google?
Click to expand...
Click to collapse
Not by sniffing, unless you own a quantum computer.
kuisma said:
Not by sniffing, unless you own a quantum computer.
Click to expand...
Click to collapse
Fiddler have HTTPS decrypting and it works, so i dont need a quantum computer.
gogus said:
Fiddler have HTTPS decrypting and it works, so i dont need a quantum computer.
Click to expand...
Click to collapse
No, not by sniffing. If you terminate your SSL session at an untrusted peer (such as Fiddler here), and re-establish it from this peer to the final destination, you can capture the plain text, but this is not sniffing, but a man-in-the-middle, and requires the establishing peer accepts a session with this untrusted peer.
I installed adfree in my nexus 5 but this block some webs and I can't enter in this webs, how can I change this?
That's the intended behavior. Disable Adfree and restart, or use a proxy (e.g. Opera Mini/Off-Road mode) to bypass this.
No, it is block the ads not the web
yeiyei0891 said:
No, it is block the ads not the web
Click to expand...
Click to collapse
You don't understand how it works. A very simple explanation is offered on their website:
http://adfree.bigtincan.com/about.php
Advertising hostnames are simply redirected to the local host (so no "webs" as you so eloquently put it) regardless of where the hostname is being requested from (your browser or your app containing ads.) That's the way the hosts file works (you can Google that for more information if you want.)
There are a few alternatives: you can block internet access for the apps with ads using a firewall (e.g. AFWall+) or use something like xad.
EDIT: Of course, you can just remove the website you want to visit from the hosts file yourself. Some ad blocking apps like AdAway allow you to do that from within the app itself (whitelist.)
is there any android app in which i can load a list of ip and hit a particular website :crying: