Android利用tcpdump抓包
来源:互联网 发布:淘宝买家新骗局2016 编辑:程序博客网 时间:2024/05/16 07:15
Android利用tcpdump抓包
Instructions
http://source.android.com/porting/tcpdump.html
Source Code and Documents
http://www.tcpdump.org/
Compiled Binary Download
http://www.strazzere.com/android/tcpdump
数据包分析工具Wireshark
http://www.wireshark.org/download.html
Installing tcpdump
Pushing the binary to an existing device
Download tcpdump from http://www.tcpdump.org/, then execute:
- adb root
- adb remount
- adb push /wherever/you/put/tcpdump /system/xbin/tcpdump
- adb shell chmod 6755 /data/local/tmp/tcpdump
Running tcpdump
You need to have root access on your device.
Batch mode capture
The typical procedure is to capture packets to a file and then examine the file on the desktop, as illustrated below:
- adb shell tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
- # "-i any": listen on any network interface
- # "-p": disable promiscuous mode (doesn't work anyway)
- # "-s 0": capture the entire packet
- # "-w": write packets to a file (rather than printing to stdout)
-
- ... do whatever you want to capture, then ^C to stop it ...
-
- adb pull /sdcard/capture.pcap .
- sudo apt-get install wireshark # or ethereal, if you're still on dapper
- wireshark capture.pcap # or ethereal
-
- ... look at your packets and be wise ...
You can run tcpdump in the background from an interactive shell or from Terminal. By default, tcpdump captures all traffic without filtering. If you prefer, add an expression like port 80 to the tcpdump command line.
Real time packet monitoring
Execute the following if you would like to watch packets go by rather than capturing them to a file (-n skips DNS lookups. -s 0 captures the entire packet rather than just the header):
- adb shell tcpdump -n -s 0
Typical tcpdump options apply. For example, if you want to see HTTP traffic:
- adb shell tcpdump -X -n -s 0 port 80
- adb root
- adb remount
- adb push /wherever/you/put/tcpdump /system/xbin/tcpdump
- adb shell chmod 6755 /data/local/tmp/tcpdump
- adb shell tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
- # "-i any": listen on any network interface
- # "-p": disable promiscuous mode (doesn't work anyway)
- # "-s 0": capture the entire packet
- # "-w": write packets to a file (rather than printing to stdout)
- ... do whatever you want to capture, then ^C to stop it ...
- adb pull /sdcard/capture.pcap .
- sudo apt-get install wireshark # or ethereal, if you're still on dapper
- wireshark capture.pcap # or ethereal
- ... look at your packets and be wise ...
- adb shell tcpdump -n -s 0
- adb shell tcpdump -X -n -s 0 port 80
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android利用tcpdump抓包
- Android系统利用tcpdump抓包
- 利用tcpdump+android虚拟机抓包
- android tcpdump 抓包
- 利用tcpdump+wireshark对android进行抓包分析
- Android通过tcpdump抓包
- android上tcpdump 抓包
- android Tcpdump抓包分析
- Android抓包tcpdump+wireshark
- android抓网络包tcpdump
- Android通过tcpdump抓包
- Android通过tcpdump抓包
- android中tcpdump抓包
- 我的灵魂永不下跪:临刑前的最后一课
- 家乡的小河
- vc “不支持尝试执行的操作”
- 关于错误 Unhandled exception in (KERNEL32.DLL):0xE06D7363:Microsoft C++ Exce vc and access insert 记录
- 20120912
- Android利用tcpdump抓包
- 投资投机经典著作55本
- Unity3d UI NGUI对象、脚本、参数
- 你紧张不?Tim比你更紧张……
- linux下设置vi编辑器的行号,方法汇总
- REST和SOAP:谁更好,或者都好?
- java Md5加密工具类
- 常见的堆性能问题以及如何防范它们
- WebVulScan是一个Web应用程序漏洞扫描器