111
Behavioral analysis
On the upstream machine
• FakeDNS—Used to direct all DNS requests to a single
host.
• FakeHTTP—Used as a generic Web server to host les.
• Proxy Server—Used to obscure your actual location.
• Wireshark—Used to capture all the netow trac pass-
ing through the machine.
Other helpful applications to have on hand include the SQL Database
Browser to read databases retrieved o the device and SQL Commander
to browse the device and move les on and o it.
Installing Samples to Devices and Emulators
Once the device is up, Eclipse will automatically see it and open
access to the monitoring tools under the DDMS perspective; but rst
you have to get something on the device to monitor. To get a sample
into your environment for testing ...