PC OA(Windows) —— OmniPeek for Wifi:
1、安装驱动(选择manually), w-kg11里有Serial Number, Activation Key
2、Run OmniPeek -> new Capture -> Adapter: Local machine--无线网络连接 -> 802.11中选择合适的channel
(channel的选择: 可以先全部capture,然后在monitor中找到对应AP的channel)
3. 在Filters中可选择wireless beacon,或者新建filter,并增加mac address过滤
MacMini —— WireShark for Wifi:
1. 安装WireShark for Mac, 并且安装XQuartz(for x11)
2. Run WireShark, 配置interface为Macmini en1,双击en1,在capture dialog取消promiscuous mode,选择monitor mode(为了抓beacon)(若MacMini连线成功,则只需抓layer3 log)
(若提示No interface,则在terminal输入sudo chmod 777 /dev/ bpf*,调用Mac网卡)
3. 点击capture filter,选择ether host mac形式,输入需要抓包的Mac address
(注意WiFi mode是否切换到了monitor,若没有可在WireShark设置结束后,重开WiFi或重开WireShark start)
Tips:
a. WireShark有时会将http package解析成IPA,此时要选中该IPA,然后右键decode as HTTP即可。
b. 搜索Package,可以通过Edit->Find Packages,选中String & package details
Wireshark: http://9916376.blog.51cto.com/468239/759981
capture filter: or
Filter
tcp.dstport == 5000
eth.addr ==a8:8e:24:a0:a3:95 || eth.addr==00:0c:43:76:87:98
Android —— TcpDump:
1. 手机要有root权限
2. 下载tcpdump http://www.strazzere.com/android/tcpdump
3. adb push c:\wherever_you_put\tcpdump /data/local/tcpdump
4. adb shell chmod 6755 /data/local/tcpdump
5, adb shell, su获得root权限
6, cd /data/local
7, ./tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
命令参数:
# "-i any": listen on any network interface
# "-p": disable promiscuous mode (doesn't work anyway)
# "-s 0": capture the entire packet
# "-w": write packets to a file (rather than printing to stdout)
... do whatever you want to capture, then ^C to stop it ...
8, adb pull /sdcard/capture.pcap d:/
9, 在电脑上用wireshark打开capture.pcap即可分析log
Execute the following if you would like to watch packets go by rather than capturing them to a file (-n skips DNS lookups. -s 0 captures the entire packet rather than just the header):
adb shell tcpdump -n -s 0
Typical tcpdump options apply. For example, if you want to see HTTP traffic:
只监听http
adb shell tcpdump -X -n -s 0 port 80
根据以上的信息,写一个bat去执行(tcpdump文件必须在当前目录里)。
开始tcpdump
adb push tcpdump /data/local/tcpdump
adb shell chmod 6755 /data/local/tcpdump
adb shell rm -r /sdcard/capture.pcap
adb shell /data/local/tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
pause
下载tcpdump文件到电脑
adb pull /sdcard/capture.pcap capture.pcap
问题:有些机器root后通过adb shell 后,默认不是root用户,需要输入 su才能切换到root,这样在执行批处理会有问题,解决方法如下
adb shell "su -c 'sleep 1'"
adb start-server
adb push tcpdump /data/local/tcpdump
因没有root权限导致的问题
adb shell su -c "/data/local/tmp/tcpdump -i any -p -s 0 -w /sdcard/netCapture.pcap"
1、安装驱动(选择manually), w-kg11里有Serial Number, Activation Key
2、Run OmniPeek -> new Capture -> Adapter: Local machine--无线网络连接 -> 802.11中选择合适的channel
(channel的选择: 可以先全部capture,然后在monitor中找到对应AP的channel)
3. 在Filters中可选择wireless beacon,或者新建filter,并增加mac address过滤
MacMini —— WireShark for Wifi:
1. 安装WireShark for Mac, 并且安装XQuartz(for x11)
2. Run WireShark, 配置interface为Macmini en1,双击en1,在capture dialog取消promiscuous mode,选择monitor mode(为了抓beacon)(若MacMini连线成功,则只需抓layer3 log)
(若提示No interface,则在terminal输入sudo chmod 777 /dev/ bpf*,调用Mac网卡)
3. 点击capture filter,选择ether host mac形式,输入需要抓包的Mac address
(注意WiFi mode是否切换到了monitor,若没有可在WireShark设置结束后,重开WiFi或重开WireShark start)
Tips:
a. WireShark有时会将http package解析成IPA,此时要选中该IPA,然后右键decode as HTTP即可。
b. 搜索Package,可以通过Edit->Find Packages,选中String & package details
Wireshark: http://9916376.blog.51cto.com/468239/759981
capture filter: or
Filter
tcp.dstport == 5000
eth.addr ==a8:8e:24:a0:a3:95 || eth.addr==00:0c:43:76:87:98
Android —— TcpDump:
1. 手机要有root权限
2. 下载tcpdump http://www.strazzere.com/android/tcpdump
3. adb push c:\wherever_you_put\tcpdump /data/local/tcpdump
4. adb shell chmod 6755 /data/local/tcpdump
5, adb shell, su获得root权限
6, cd /data/local
7, ./tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
命令参数:
# "-i any": listen on any network interface
# "-p": disable promiscuous mode (doesn't work anyway)
# "-s 0": capture the entire packet
# "-w": write packets to a file (rather than printing to stdout)
... do whatever you want to capture, then ^C to stop it ...
8, adb pull /sdcard/capture.pcap d:/
9, 在电脑上用wireshark打开capture.pcap即可分析log
Execute the following if you would like to watch packets go by rather than capturing them to a file (-n skips DNS lookups. -s 0 captures the entire packet rather than just the header):
adb shell tcpdump -n -s 0
Typical tcpdump options apply. For example, if you want to see HTTP traffic:
只监听http
adb shell tcpdump -X -n -s 0 port 80
根据以上的信息,写一个bat去执行(tcpdump文件必须在当前目录里)。
开始tcpdump
adb push tcpdump /data/local/tcpdump
adb shell chmod 6755 /data/local/tcpdump
adb shell rm -r /sdcard/capture.pcap
adb shell /data/local/tcpdump -i any -p -s 0 -w /sdcard/capture.pcap
pause
下载tcpdump文件到电脑
adb pull /sdcard/capture.pcap capture.pcap
问题:有些机器root后通过adb shell 后,默认不是root用户,需要输入 su才能切换到root,这样在执行批处理会有问题,解决方法如下
adb shell "su -c 'sleep 1'"
adb start-server
adb push tcpdump /data/local/tcpdump
因没有root权限导致的问题
adb shell su -c "/data/local/tmp/tcpdump -i any -p -s 0 -w /sdcard/netCapture.pcap"