![]() The easiest way to do that is to apply a display filter (Analyze -> Display Filters…). For the purposes of this example it is useful to apply some filters so we can focus in on the HTTP request traffic. This can be interesting to watch and see all of the things your iOS device is doing. Selecting rvi0 switches us to a live capture of the packet data with a lot more information to help us decode and understand what is going on. The one we are interested in is of course our virtual interface rvi0: Once you have Wireshark installed and running you should see a list of available interfaces that it can capture. Luckily Mac OS X ports are readily available, if you are following along I downloaded and installed version 1.6.5 for OS X 10.6 (Snow Leopard) Intel 64-bit from here. Wireshark is a much easier tool if you want perform deeper packet inspection or if you just prefer your network debugging tools to have a user interface. Whilst tcpdump is a quick and easy way to see and capture traffic it is not exactly an easy tool to use when you want to figure out what is going on. For that we need to use a more sophisticated tool than tcpdump. This is a minor improvement in that we can now see the HTTP GET request with the query we are using and see the HTTP response but we still cannot easily drop down into the JSON in the result to see what Twitter is sending back. GET /search.json?rpp =100 & q =apple HTTP/1.1 The http request starts on line 5 where you can see an outgoing connection to port 80: My local IP address is 192.168.1.66 and the IP of the remote Twitter server in this case is 199.59.148.201. The -t option gets rid of the timestamp on each line, -q removes some of the packet header information which is not interesting and finally we specify that we are only interested in TCP/IP packets. Note the tcpdump options I am using to cut down some of the noise. Listening on rvi0, link-type RAW (Raw IP ), capture size 65535 bytes Tcpdump: verbose output suppressed, use -v or -vv for full protocol decode (BIOCPROMISC: Operation not supported on socket ) tcpdump: WARNING: rvi0: no IPv4 address assigned Tcpdump: WARNING: rvi0: That device doesn 't support promiscuous mode The following command needs to be entered in the terminal window: The remote virtual interface is created using the rvictl command, using the UDID you obtained in the previous step. ![]()
0 Comments
Leave a Reply. |