If you want to sniff your devices traffic and visualize it on Wireshark, you’ll need:
- tcpdump
- netcat
- wireshark/tshark
Make sure you have tcpdump installed on your machine. I highly recommend you installing
the Debian Kit
which I’ve been using for years now. It makes things less complicated. Once you have done that, log in
to your Android device and switch to the Debian environment:
|
|
Now you can start tcpdump and pipe its output to netcat:
|
|
Afterwards you want to access port 11111 on the Android device using port forwarding:
|
|
On your laptop/pentest machine you can run tshark:
|
|
Using wireshark that’d be:
|
|
Happy hacking!