If you want to sniff your devices traffic and visualize it on Wireshark, you’ll need:

Make sure you have tcpdump installed on your machine. I highly recommend you installing the Debian Kit which I’ve been using for years now. It makes things less complicated. Once you have done that, log in to your Android device and switch to the Debian environment:

victor@delia:/$ adb shell
# deb
root@debian:/#

Now you can start tcpdump and pipe its output to netcat:

root@debian:/# tcpdump -i wlan0 -s0 -w - | nc -l -p 11111

Afterwards you want to access port 11111 on the Android device using port forwarding:

victor@delia:/$ adb forward tcp:11111 tcp:11111

On your laptop/pentest machine you can run tshark:

victor@delia:/$ nc localhost 11111 | tshark -i -

Using wireshark that’d be:

victor@delia:/$ nc localhost 11111 | wireshark -k -S -i -

Happy hacking!