Skip to content

Capture the Android devices traffic and export it in PCAP format. No root privileges required.

License

Notifications You must be signed in to change notification settings

An2i/PCAPdroid

 
 

Repository files navigation

PCAPdroid

PCAPdroid is an android app to capture the phone traffic and analyze it remotely (e.g. via Wireshark). The traffic can be easily downloaded from a remote device thanks to the integrated HTTP server, or streamed to a remote UDP receiver.

Realtime Traffic Analysis:

tools/udp_receiver.py -p 1234 | wireshark -k -i -

Features:

  • Capture apps traffic without root
  • Easily download a PCAP file thanks to the integrated HTTP server
  • Stream the PCAP on UDP to a remote receiver
  • Show captured traffic realtime statistics
  • Apply a filter to only capture traffic for the selected app
  • Get active connections details, including server name, DNS query and URL

Download:

https://github.com/emanuele-f/PCAPdroid/releases

https://play.google.com/store/apps/details?id=com.emanuelef.remote_capture

App filter and DNS Traffic

Many applications rely on the Android DNS resolution service netd in order to resolve names. All the DNS requests sent via this service will come from netd, so it's not possible to which app made the request, so the app filter won't work. In order to circunvent this, PCAPdroid will dump all the DNS traffic from netd regardless of the app filter. This can be disabled by toggling off the "Capture Unknown Traffic" preference.

Receiving the PCAP on UDP

The UDP receiver script can be used to receive the packets from the mobile application. As an alternative, the socat utily can be used (e.g. socat -b 65535 - udp4-listen:1234) but without the ability to pause and resume the capture. When using socat, setting the -b option is mandatory in order to correctly receive the packets (not supported in nc).

  • Analyze the traffic in Wireshark:
udp_receiver.py -p 1234 | wireshark -k -i -
  • Analyze the traffic with ntopng:
udp_receiver.py -p 1234 | ntopng -m “10.215.173.0/24” -i -
  • Write the traffic to a PCAP file:
udp_receiver.py -p 1234 | tcpdump -w dump.pcap -r -

How it Works

In order to run without root, the app takes advantage of the Android VPNService API to collect the packets on the device (they are not sent to an external VPN server). The zdtun connections proxy library is used to route the packets back to their original destination. Here are some diagrams of how it works:

Building

  1. Clone this repo locally
  2. Clone https://github.com/emanuele-f/zdtun beside this repository
  3. Clone https://github.com/ntop/nDPI beside this repository
  4. Link the cmake file into nDPI: from this repo execute: ln -s $(readlink -f nDPI/CMakeLists.txt) ../nDPI
  5. Inside the nDPI directory, run ./autogen.sh
  6. Build the zdtun and ndpi modules first
  7. Then build the app module

About

Capture the Android devices traffic and export it in PCAP format. No root privileges required.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Java 57.5%
  • C 40.1%
  • Python 1.3%
  • CMake 1.1%