TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them.
This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs).
The idea of TinyCheck emerged in a meeting about stalkerware with a French women’s shelter.
During this meeting we talked about how to easily detect stalkerware without installing very technical apps nor doing forensic analysis on the victim’s smartphone.
The initial concept was to develop a tiny kiosk device based on Raspberry Pi which can be used by non-tech people to test their smartphones against malicious communications issued by stalkerware or any spyware.
Of course, TinyCheck can also be used to spot any malicious communications from cybercrime to state-sponsored implants.
It allows the end-user to push their own extended Indicators of Compromise via a backend in order to detect some ghosts over the wire.
If you need more documentation on how to install it, use it and the internals, don’t hesitate to take a look at the TinyCheck Wiki.
TinyCheck can be used in several ways by individuals and entities:
Please check the few steps in the Wiki’s Installation Page.
The frontend – which can be accessed from http://tinycheck.local
is a kind of tunnel which help the user throughout the process of network capture and reporting.
It allows the user to setup a Wi-Fi connection to an existing Wi-Fi network, create an ephemeral Wi-Fi network, capture the communications and show a report to the user… in less than one minute, 5 clicks and without any technical knowledge
Once installed, you can connect yourself to the TinyCheck backend by browsing the URL https://tinycheck.local
and accepting the SSL self-signed certificate.
The backend allows you to edit the configuration of TinyCheck, add extended IOCs and whitelisted elements in order to prevent false positives.
Several IOCs are already provided such as few suricata rules, FreeDNS, Name servers, CIDRs known to host malicious servers and so on.
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists…
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which…
Efficient disk space management is vital in Linux, especially for system administrators who manage servers…
Knowing how to check directory sizes in Linux is essential for managing disk space and…
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a…
Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing…