-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Regarding the problem of reading the request body and response body of the websocket #730
Labels
question
Further information is requested
Comments
Here is the decrypted text, but it is encoded. eCapture is not very perfect for parsing the encoded content. You can use the |
Okay, I'll try. Thank you~~~ |
This is the log of running the command ./ecapture tls -m pcap -i wlan0 --pcapfile=ecaecapture.pcapng tcp port 443
2025-02-11T08:38:05Z INF AppName="eCapture(旁观者)"
2025-02-11T08:38:05Z INF HomePage=https://ecapture.cc
2025-02-11T08:38:05Z INF Repository=https://github.com/gojue/ecapture
2025-02-11T08:38:05Z INF Author="CFC4N <[email protected]>"
2025-02-11T08:38:05Z INF Description="Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64."
2025-02-11T08:38:05Z INF Version=androidgki_arm64:v0.9.3:6.5.0-1025-azure
2025-02-11T08:38:05Z INF Listen=localhost:28256
2025-02-11T08:38:05Z INF eCapture running logs logger=
2025-02-11T08:38:05Z INF the file handler that receives the captured event eventCollector=
2025-02-11T08:38:05Z INF Kernel Info=5.10.149 Pid=6562
2025-02-11T08:38:05Z INF listen=localhost:28256
2025-02-11T08:38:05Z INF https server starting...You can upgrade the configuration file via the HTTP interface.
2025-02-11T08:38:05Z WRN Your environment is like a container. We won't be able to detect the BTF configuration.
If eCapture fails to run, try specifying the BTF mode. use `-b 2` to specify non-CORE mode.
2025-02-11T08:38:05Z INF BTF bytecode mode: CORE. btfMode=0
2025-02-11T08:38:05Z INF module initialization. isReload=false moduleName=EBPFProbeOPENSSL
2025-02-11T08:38:05Z INF Module.Run()
2025-02-11T08:38:05Z ERR OpenSSL/BoringSSL version not found, used default version.If you want to use the specific version, please set the sslVersion parameter with "--ssl_version='boringssl_a_13'" , "--ssl_version='boringssl_a_14'", or use "ecapture tls --help" for more help.
2025-02-11T08:38:05Z ERR bpfFile=boringssl_a_13_kern.o sslVersion=android_default
2025-02-11T08:38:05Z INF HOOK type:Openssl elf ElfType=2 IFindex=47 IFname=wlan0 PcapFilter="tcp port 443" binrayPath=/apex/com.android.conscrypt/lib64/libssl.so
2025-02-11T08:38:05Z INF Hook masterKey function Functions=["SSL_in_init"]
2025-02-11T08:38:05Z INF target all process.
2025-02-11T08:38:05Z INF target all users.
2025-02-11T08:38:05Z INF setupManagers eBPFProgramType=PcapNG
2025-02-11T08:38:05Z INF packets saved into pcapng file. pcapng path=/data/local/tmp/ecaecapture.pcapng
2025-02-11T08:38:05Z INF BPF bytecode file is matched. bpfFileName=user/bytecode/boringssl_a_13_kern_core.o
2025-02-11T08:38:06Z INF perfEventReader created mapSize(MB)=4
2025-02-11T08:38:06Z INF perfEventReader created mapSize(MB)=4
2025-02-11T08:38:06Z INF module started successfully. isReload=false moduleName=EBPFProbeOPENSSL
2025-02-11T08:38:09Z INF CLIENT_RANDOM save success CLientRandom=b7fe4ef57b165fdbc72c059ae17321631dfc4cc597a6f6cfb3157b135462e488 bytes=938 eBPFProgramType=PcapNG sslVersion=TLS1_3_VERSION
2025-02-11T08:38:11Z INF packets saved into pcapng file. count=1
2025-02-11T08:38:21Z INF packets saved into pcapng file. count=4
2025-02-11T08:38:23Z INF packets saved into pcapng file. count=2
2025-02-11T08:38:27Z INF packets saved into pcapng file. count=2
2025-02-11T08:38:35Z INF packets saved into pcapng file. count=1
2025-02-11T08:38:37Z INF packets saved into pcapng file. count=1
2025-02-11T08:38:53Z INF packets saved into pcapng file. count=2
2025-02-11T08:38:55Z INF packets saved into pcapng file. count=2
2025-02-11T08:38:57Z INF packets saved into pcapng file. count=1
2025-02-11T08:39:01Z INF packets saved into pcapng file. count=1
2025-02-11T08:39:09Z INF packets saved into pcapng file. count=1
ç^C2025-02-11T08:39:18Z INF module close.
2025-02-11T08:39:18Z INF Module closed,message recived from Context
2025-02-11T08:39:18Z INF packets saved into pcapng file. count=18
2025-02-11T08:39:18Z INF iModule module close
2025-02-11T08:39:18Z INF bye bye. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
How do I get the request body and response body of the websocket? Now I can see the request header and response header
The text was updated successfully, but these errors were encountered: