Monitoring Android Traffic with Wireshark

This migration away from direct Web access in favor of dedicated smartphone apps has made for a richer user experience, but it also has made knowing exactly what is going on “under the hood” a lot harder.

Monitoring Android Traffic with Wireshark article from Linux Journal tells how you can use Wireshark to monitor data flow between the app running in smart phone and the cloud service. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options. Wireshark is originally designed for monitoring TCP/P and Ethernet network traffic, but can be used to also monitor wireless networks and USB traffic.

Monitoring Android Traffic with Wireshark article shows how, with just a little bit of work, you can use Linux to transform almost any laptop into a secret-sharing wireless access point (WAP), connect your phone and view the data flowing to and from the phone with relative ease. All you really need is a laptop running Linux with one wireless and one Ethernet connection. You don’t need to mess around with your existing router (no need to change security settings) and doesn’t require rooting or installing anything unseemly on your phone.

This looks interesting and something I might need some day. I have used Wireshark very much (I have even written my own protocol dissectors to it using Lua), but I have not yet used it to monitor wireless traffic from Android phone.

84 Comments

  1. Tomi Engdahl says:

    Perl script to convert a regular log file as syslog messages in a pcap file for wireshark
    https://gist.github.com/mdeweerd/47ea977028259ee9a6b6fd8f2356c65d

    Reply
  2. Tomi Engdahl says:

    Effortless PCAP File Analysis in Your Browser

    Explore and analyze PCAP files online using A-Packets, designed to provide comprehensive insights into network protocols like IPv4/IPv6, HTTP, Telnet, FTP, DNS, SSDP, and WPA2. This tool allows users to easily view details of network communications and dissect layers of data transmission.

    https://apackets.com/

    Reply
  3. Tomi Engdahl says:

    Setting up custom column views within Wireshark.
    https://www.youtube.com/watch?v=qamES2CmfSA

    Reply
  4. Tomi Engdahl says:

    Analyzing DHCP and BGP packet captures with multi AI with Kubernetes
    https://www.youtube.com/watch?v=Ft7C10mHB1U

    Reply
  5. Tomi Engdahl says:

    https://www.toolify.ai/gpts/g-VQAlpoZ9n

    https://chatgpt.com/g/g-VQAlpoZ9n-wireshark-tcp-dump-analyzer/c/67b884eb-017c-8006-b7a8-aa935ccd5ae3

    Convert the file to text (e.g., using tcpdump -r captureWithOnOff.pcap -n -tttt > capture.txt) and upload the text output for analysis.

    Reply
  6. Tomi Engdahl says:

    How to Decrypt SSL with Wireshark – HTTPS Decryption Guide
    If you’ve ever tried using Wireshark to monitor web traffic, you’ve probably run into a problem – a lot of it is encrypted transmissions. In fact, most sites are using SSL or Transport Layer Security (TLS) encryption to keep their users safe.
    https://www.comparitech.com/net-admin/decrypt-ssl-with-wireshark/

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*