Android利用tcpdump抓包
来源:互联网 发布:漫威漫画软件 编辑:程序博客网 时间:2024/05/16 22:28
Android利用tcpdump抓包
Instructions
http://source.android.com/porting/tcpdump.html
Source Code and Documents
http://www.tcpdump.org/
Compiled Binary Download
http://www.strazzere.com/android/tcpdump
数据包分析工具Wireshark
http://www.wireshark.org/download.html
Installing tcpdump
Pushing the binary to an existing device
Download tcpdump from http://www.tcpdump.org/, then execute:
- adb root
- adb remount
- adb push /wherever/you/put/tcpdump /system/xbin/tcpdump
- adb shell chmod 6755 /data/local/tmp/tcpdump
adb rootadb remountadb push /wherever/you/put/tcpdump /system/xbin/tcpdumpadb shell chmod 6755 /data/local/tmp/tcpdump
Running tcpdump
You need to have root access on your device.
Batch mode capture
The typical procedure is to capture packets to a file and then examine the file on the desktop, as illustrated below:
- adb shell tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
- # "-i any": listen on any network interface
- # "-p": disable promiscuous mode (doesn't work anyway)
- # "-s 0": capture the entire packet
- # "-w": write packets to a file (rather than printing to stdout)
-
- ... do whatever you want to capture, then ^C to stop it ...
-
- adb pull /sdcard/capture.pcap .
- sudo apt-get install wireshark # or ethereal, if you're still on dapper
- wireshark capture.pcap # or ethereal
-
- ... look at your packets and be wise ...
adb shell tcpdump -i any -p -s 0 -w /sdcard/capture.pcap# "-i any": listen on any network interface# "-p": disable promiscuous mode (doesn't work anyway)# "-s 0": capture the entire packet# "-w": write packets to a file (rather than printing to stdout) ... do whatever you want to capture, then ^C to stop it ...adb pull /sdcard/capture.pcap .sudo apt-get install wireshark # or ethereal, if you're still on dapperwireshark capture.pcap # or ethereal ... look at your packets and be wise ...
You can run tcpdump in the background from an interactive shell or from Terminal. By default, tcpdump captures all traffic without filtering. If you prefer, add an expression like port 80 to the tcpdump command line.
Real time packet monitoring
Execute the following if you would like to watch packets go by rather than capturing them to a file (-n skips DNS lookups. -s 0 captures the entire packet rather than just the header):
- adb shell tcpdump -n -s 0
adb shell tcpdump -n -s 0
Typical tcpdump options apply. For example, if you want to see HTTP traffic:
- adb shell tcpdump -X -n -s 0 port 80
adb shell tcpdump -X -n -s 0 port 80
- adb root
- adb remount
- adb push /wherever/you/put/tcpdump /system/xbin/tcpdump
- adb shell chmod 6755 /data/local/tmp/tcpdump
- adb shell tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
- # "-i any": listen on any network interface
- # "-p": disable promiscuous mode (doesn't work anyway)
- # "-s 0": capture the entire packet
- # "-w": write packets to a file (rather than printing to stdout)
- ... do whatever you want to capture, then ^C to stop it ...
- adb pull /sdcard/capture.pcap .
- sudo apt-get install wireshark # or ethereal, if you're still on dapper
- wireshark capture.pcap # or ethereal
- ... look at your packets and be wise ...
- adb shell tcpdump -n -s 0
- adb shell tcpdump -X -n -s 0 port 80
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android系统利用tcpdump抓包
- 利用tcpdump+android虚拟机抓包
- android tcpdump 抓包
- 利用tcpdump+wireshark对android进行抓包分析
- Android通过tcpdump抓包
- android上tcpdump 抓包
- android Tcpdump抓包分析
- Android抓包tcpdump+wireshark
- android抓网络包tcpdump
- Android通过tcpdump抓包
- Android通过tcpdump抓包
- android中tcpdump抓包
- hibernate连接Mysql中文乱码处理
- ORACLE常用查询语句
- Mysql配置为Master/Slave的常用维护命令
- .net连接各种数据库
- 黑马程序员---总结的java基础知识
- Android利用tcpdump抓包
- 数据库表及字段命名、设计规范
- XSD 数据类型
- UBOOT 移植操作(1)
- UBOOT 移植操作(2)
- libgdx一个完整的处理流程
- Ext源码分析:Ext.onReady到底做了什么?
- Tomcat5/6 GBK编码下完美解决中文表单问题的过滤器
- WatchDog Timer