How can I analyze the packets which is captured by wireshark using rvictl in iOS develop

StackOverflow https://stackoverflow.com/questions/22246442

  •  10-06-2023
  •  | 
  •  

The packets captured are nearly unable to analyze, I can not even see the source/destination address of these packets, how can i make them more friendly to analyze

有帮助吗?

解决方案

The problem is that rvictl adds a header to the packet frame. To have wireshark parse them properly, add a user offset:
Edit -> Preferences -> Protocols -> DLT_USER -> Edit
Select New. The payload protocol should be "ip" (without the quotes). The Header size should be 112 if you are sniffing 3G and 108 if you are sniffing wifi. The tailer size should be 0.
Select Ok, and Ok. Wireshark should reload the currently open packets, and it should appear parsed.

许可以下: CC-BY-SA归因
不隶属于 StackOverflow
scroll top