PCAPdroid is an android app to capture the phone traffic and analyze it remotely (e.g. via Wireshark). The traffic can be easily downloaded from a remote device thanks to the integrated HTTP server, or streamed to a remote UDP receiver.
Realtime Traffic Analysis:
tools/udp_receiver.py -p 1234 | wireshark -k -i -
Features:
- Capture apps traffic without root
- Easily download a PCAP file thanks to the integrated HTTP server
- Stream the PCAP on UDP to a remote receiver
- Show captured traffic realtime statistics
- Apply a filter to only capture traffic for the selected app
- Get active connections details, including server name, DNS query and URL
- Decrypt HTTPS/TLS traffic via a remote mitmproxy
Download:
https://github.com/emanuele-f/PCAPdroid/releases
https://play.google.com/store/apps/details?id=com.emanuelef.remote_capture
Check out the quick start instructions or the full User Guide.
You can help the PCAPdroid project in many ways:
- Translate the app in your language
- Improve the app theme and layout
- Propose and discuss new features
- Open bug reports with detailed information
- Star the project on github and on the Play Store
- Of course provide code pull requests!
You can reach the PCAPdroid developers and community on the telegram channel.
Many applications rely on the Android DNS resolution service netd
in order to resolve names. All the DNS requests sent via this service will come from netd
, so it's not possible to which app made the request, so the app filter won't work. In order to circunvent this, PCAPdroid will dump all the DNS traffic from netd
regardless of the app filter. This can be disabled by toggling off the "Capture Unknown Traffic" preference.
In order to run without root, the app takes advantage of the Android VPNService API to collect the packets on the device (they are not sent to an external VPN server). The zdtun connections proxy library is used to route the packets back to their original destination. Here are some diagrams of how it works:
PCAPdroid supports decrypting TLS traffic by sending it to a customized version of mitmproxy. Check out the User Guide for more details.
PCAPdroid integrates nDPI to detect the application protocol of the network connections and extract the SNI from TLS connections.
- Clone this repo locally
- Clone https://github.com/emanuele-f/zdtun beside this repository
- Clone https://github.com/ntop/nDPI beside this repository
- Link the cmake file into nDPI: from this repo execute:
ln -s $(readlink -f nDPI/CMakeLists.txt) ../nDPI
- Inside the nDPI directory, run
git checkout 3.4-stable; ./autogen.sh; ./configure --disable-gcrypt
- Build the
zdtun
andndpi
modules first - Then build the
app
module