Created
November 22, 2015 18:05
-
-
Save SqREL/13df76f66f4d248199bd to your computer and use it in GitHub Desktop.
iOS package sniffer
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1.Connect your iOS device to your Mac via USB. | |
2.Get the UDID for the connected device from iTunes or organiser. | |
3.Open terminal in your Mac | |
4.type the following commands in the terminal | |
$ ifconfig -l // First get the current list of interfaces. | |
$ rvictl -s <udid> // Then run the tool with the UDID of the device. | |
// This adds a new virtual network interface rvi0. | |
$ ifconfig -l | |
// Get the list of interfaces again, and you can see the new | |
virtual network interface, rvi0, added by the previous command. | |
$ sudo tcpdump -i rvi0 -w ./output.pcap // Get the traced packets and save it to a file | |
Note : output.pacp is the packet traced file and will be located in the systems root directory | |
When you're done you can stop the process with the following command. | |
$ rvictl -x <udid> | |
open the .pacp using wireshark and do your default procedures. Thats it !!!!!!!! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment