-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not able to work on common-android15-6.6 kernel #729
Comments
Hello @FredyR4zox! I'm here to assist you with any bugs, questions, or contributions you may have. To address the issue of encrypted traffic in Wireshark and the lack of output to the keylog file, here are some steps and considerations:
If these steps do not resolve the issue, consider reviewing the kernel configuration and ensuring that all necessary eBPF and network capture features are enabled. To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
This is a known bug #659, fixed in PR #723, but no new version has been released yet. You can download https://github.com/cfc4n/ecapture/releases/tag/v0.9.4 to verify. A new version is expected to be released at the end of February, please be patient. |
I've compiled it with that PR. That's why I'm using the option |
As can be seen from the screenshot, the TLS key is captured. Although Alternatively, you can compile the DEBUG=1 ANDROID=1 make PS: On android, the kernel's debug log directory may be |
Thank you, but the debug flag ( I also tried using another application but without success :/ Is Also, using the Cuttlefish emulator with the default kernel does not work. |
The log printed by the eBPF program will appear in Also, I'm not sure if your kernel environment will have an impact on eBPF programs. I'm not familiar with |
My environment is Android Studio arm64 via #659 (comment) |
Hello. First of all, thank you for developing this tool!
I am trying to use eCapture on the Cuttlefish emulator using a custom built kernel (I just added KernelSU to the normal kernel). I gave my shell all the capabilities that are available and built the tool using the latest commit, which adds support for BoringSSL on Android 15. But I still cannot do it. I've seen that the application I'm trying to test uses the default libssl library.
I tried to use -b 0, 1, and 2, but nothing worked.
I can intercept traffic but when viewing it on Wireshark it's always encrypted. Adding a keylog file to output does not work because no output is done to it.
./ecapture tls -m pcap -i buried_eth0 --pcapfile=ecapture.pcapng --keylogfile="ecapture_openssl_key.log" --libssl=/apex/com.android.conscrypt/lib64/libssl.so --ssl_version="boringssl_a_15"
Cuttlefish emulator with Android 15
Linux localhost 6.6.58-android15-8-maybe-dirty #1 SMP PREEMPT Thu Jan 1 00:00:00 UTC 1970 x86_64 Toybox
linux_amd64:v0.9.3-20250206-4fc023c:6.12.11-1-MANJARO
Screenshots:
Do you think that using bpftrace is a good alternative?
Thank you in advance.
The text was updated successfully, but these errors were encountered: