If you want to sniff your devices traffic and visualize it on Wireshark, you’ll need:
- tcpdump
- netcat
- wireshark/tshark
Make sure you have tcpdump
installed on your machine. I highly recommend you installing
the Debian Kit
which I’ve been using for years now. It makes things less complicated. Once you have done that, log in
to your Android device and switch to the Debian environment:
|
|
Now you can start tcpdump
and pipe its output to netcat
:
|
|
Afterwards you want to access port 11111
on the Android device using port forwarding:
|
|
On your laptop/pentest machine you can run tshark
:
|
|
Using wireshark
that’d be:
|
|
Happy hacking!