I would like to capture packets of the internet traffic of my mobile. I would like to ask that if I install wire shark on my desktop machine, and then make my desktop a wifi hot spot, connect my mobile phone with this desktop powered wifi then Would I be able to capture/analyse packets of my internet traffic of mobile on wire shark at desktop? Your help is highly appreciated. asked 04 Nov '13, 23:39 zohaibjabbar |
2 Answers:
There is software available that turns a Windows (or Linux) system into a wireless access point (please search google). So, if you manage to convert your system into a wireless access point (aka Hotspot) and you run Wireshark on that system, you will/should be able to see the traffic that is forwarded through that system. Regards answered 05 Nov '13, 05:24 Kurt Knochner ♦ edited 05 Nov '13, 05:30 |
Hi, try tPacketCapture , this does no require any rooting of the device, its freely downloadable from the android market place https://play.google.com/store/apps/details?id=jp.co.taosoftware.android.packetcapture&hl=en Its fast and efficient, there is a paid version with better features. setting-up hotspot on PC is a cumbersome process answered 10 Nov '13, 20:20 deepacket edited 10 Nov '13, 20:21 |
Hi Kurt, thanks for you response. I was able to get the traffic. Can you please let me know that how can I identify that which data packet belongs to which application installed on phone? and how can I analyse the data section? thanks again for your time.
You can't as the packets don't contain that information. You may find hints in the packets (IP addresses, DNS, certificates, etc.) that give an idea about the application (google, apple, twitter, whatsapp, etc.) but nothing reliable to identify an application. With root access to the phone you might be able to get more information (like 'netstat -na'), but that's beyond the socpe of this site.
depends on your needs. A simple way:
That will show you the transmitted data. If it contains clear text (not encrypted and the like), you can read it. Otherwise (encrypted) there is not much you can analyze.