Home > Uncategorized > Packet Sniffing on the Samsung Galaxy Android phone.

Packet Sniffing on the Samsung Galaxy Android phone.

Following on from my earlier post where I mentioned that all browser traffic using Opera Mini is routed through Opera’s own proxy I set out to confirm this by sniffing my browser traffic.

The Android Marketplace provides an Android version of Wireshark called “Shark for Root”. The “Root” simply means you need a rooted phone for it to capture packets. There’s also a Shark Reader which gives rudimentary ability to view .pcap files captured from Shark. Shark Reader can be launched independently of Shark or from within the Shark App itself. Below is a screenshot from the MarketPlace showing both apps.

Once the apps are installed they appear on your phone as follows:

Now launch Shark for Root. The default parameters are for verbose capture and snap length 0 which gives the entire packet. Click Start and start capturing packets. The app is ad supported so you’ll need to put up with the adverts on the top of the screen. You can also see the option I mentioned earlier to open Shark Reader from within Shark for Root.

Categories: Uncategorized

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: