-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ver 0.8.9 can`t work on android kernel 6.1.99 , but ver 0.6.1 did work #659
Comments
Try using |
把关于设备的页面发一下看看 |
0.7.0 可以获取 keylog 吗 |
佬,我之前提的问题应该也是和这个情况一样的,用0.61版本就可以抓到https报文,我内核是6.1.57 |
0.6.1 can work,but i want the higher version |
没有相关硬件设备,无法重现。 |
Hello, @cfc4n! I'm here to help you with any issues you're facing. If you need assistance with bugs, have questions, or want to become a contributor, I'm here to assist you while waiting for a human maintainer. It seems that there are issues with eCapture version 0.8.9 on Android kernel 6.1.99, while version 0.6.1 works fine. A similar issue was discussed in a GitHub issue where users faced challenges capturing HTTPS packets on an Android device with kernel version 6.1.57. They suggested using the Additionally, eCapture utilizes eBPF to capture SSL/TLS traffic by hooking into specific functions in OpenSSL/BoringSSL libraries. Potential points of failure could include kernel version compatibility, library version detection, and eBPF program loading issues [1]. If the To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
Maybe i meet seem problem with aosp 14. Kernel Info=6.1.68 AMD64 |
I don't have these mobile devices and can't reproduce. Are you using an emulator? How can I reproduce this issue? |
@mrprona92 Can you provide an SSH account for remote access? |
Unfortunately. I working on Project with high security and cant provide SSH account for you. On android i think can try with generic system image for emulator. Can you give a try with version aosp_arm64-exp-UQ1A.231205.015-11084887-e291b838.zip on https://developer.android.com/topic/generic-system-image/releases? |
And i think have some changes from android target 14 for SSLKEYLOG |
@cfc4n today i tried with android target 13. It working. but nothing happen when try with android target 14. I think android version 14 is main problem. |
Thank you for letting me know, but I don’t have an android 14 device, so I can‘t reproduce it. I can try to fix it. Can you test it for me? |
sure. just send me your fix. i can try |
@mrprona92 try #723 |
do you have an builded file ecapture. or how i can build your change on the source code to ecapture file? |
i tried. but seem nothing happen when ssl handshake 26|device_now:/data/local/tmp # ./ecapture tls -m keylog -keylogfile=openssl_keylog.log ^C2024-12-23T06:18:52Z INF module close. |
@r0ysue can you try 0.9.4 can working on your side? |
I verified it on the Android 13 (Kernel 5.15) of the Android Studio simulator. emu64a:/ $ su
emu64a:/ # cd /da
data/ data_mirror/
emu64a:/ # cd /data/loca
local.prop local/
emu64a:/ # cd /data/local
local.prop local/
emu64a:/ # cd /data/local/t
tests/ tmp/ traces/
emu64a:/ # cd /data/local/tmp/
emu64a:/data/local/tmp # ls
11.keylog a.pcapng ecapture
emu64a:/data/local/tmp # ls -al
total 24876
drwxrwx--x 3 shell shell 4096 2025-01-24 19:13 .
drwxr-x--x 5 root root 4096 2024-01-21 13:51 ..
drwxr-xr-x 2 shell shell 4096 2025-01-24 19:08 .studio
-rw------- 1 root root 3112 2024-11-12 19:07 11.keylog
-rw-r--r-- 1 root root 810568 2024-11-12 19:35 a.pcapng
-rwxrwxrwx 1 shell shell 24617968 2025-01-22 23:27 ecapture
emu64a:/data/local/tmp # ./ecapture tls
2025-01-24T11:13:53Z INF AppName="eCapture(旁观者)"
2025-01-24T11:13:53Z INF HomePage=https://ecapture.cc
2025-01-24T11:13:53Z INF Repository=https://github.com/gojue/ecapture
2025-01-24T11:13:53Z INF Author="CFC4N <[email protected]>"
2025-01-24T11:13:53Z INF Description="Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64."
2025-01-24T11:13:53Z INF Version=androidgki_arm64:v0.9.4:6.5.0-1025-azure
2025-01-24T11:13:53Z INF Listen=localhost:28256
2025-01-24T11:13:53Z INF eCapture running logs logger=
2025-01-24T11:13:53Z INF the file handler that receives the captured event eventCollector=
2025-01-24T11:13:53Z INF listen=localhost:28256
2025-01-24T11:13:53Z INF https server starting...You can upgrade the configuration file via the HTTP interface.
2025-01-24T11:13:53Z INF Kernel Info=5.15.41 Pid=5406
2025-01-24T11:13:53Z WRN Your environment is like a container. We won't be able to detect the BTF configuration.
If eCapture fails to run, try specifying the BTF mode. use `-b 2` to specify non-CORE mode.
2025-01-24T11:13:53Z INF BTF bytecode mode: CORE. btfMode=0
2025-01-24T11:13:53Z INF master key keylogger has been set. eBPFProgramType=Text keylogger=
2025-01-24T11:13:53Z INF module initialization. isReload=false moduleName=EBPFProbeOPENSSL
2025-01-24T11:13:53Z INF Module.Run()
2025-01-24T11:13:53Z ERR OpenSSL/BoringSSL version not found, used default version.If you want to use the specific version, please set the sslVersion parameter with "--ssl_version='boringssl_a_13'" , "--ssl_version='boringssl_a_14'", or use "ecapture tls --help" for more help.
2025-01-24T11:13:53Z ERR bpfFile=boringssl_a_13_kern.o sslVersion=android_default
2025-01-24T11:13:53Z INF Hook masterKey function ElfType=2 Functions=["SSL_in_init"] binrayPath=/apex/com.android.conscrypt/lib64/libssl.so
2025-01-24T11:13:53Z INF target all process.
2025-01-24T11:13:53Z INF target all users.
2025-01-24T11:13:53Z INF setupManagers eBPFProgramType=Text
2025-01-24T11:13:53Z INF BPF bytecode file is matched. bpfFileName=user/bytecode/boringssl_a_13_kern_core.o
2025-01-24T11:13:53Z INF perfEventReader created mapSize(MB)=4
2025-01-24T11:13:53Z INF perfEventReader created mapSize(MB)=4
2025-01-24T11:13:53Z INF module started successfully. isReload=false moduleName=EBPFProbeOPENSSL
2025-01-24T11:14:19Z ??? UUID:2229_2940_ThreadPoolForeg_0_1_0.0.0.0:0-0.0.0.0:0, Name:HTTPRequest, Type:1, Length:886
POST /service/update2 HTTP/1.1
Host: update.googleapis.com
Accept-Encoding: gzip
Connection: Keep-Alive
Content-Length: 615
Content-Type: application/x-www-form-urlencoded
User-Agent: Dalvik/2.1.0 (Linux; U; Android 13; sdk_gphone64_arm64 Build/TE1A.220922.034)
<?xml version='1.0' encoding='UTF-8' standalone='yes' ?><request protocol="3.0" updater="Android" updaterversion="103.0.5060.71" updaterchannel="chrome" ismachine="1" requestid="{45a06597-6a1a-4755-af9b-97ce77994453}" sessionid="{10b1872a-5cdf-44b0-9ab0-23e27c8adcb4}" installsource="system_image" dedup="cr"><os platform="android" version="13" arch="arm" /><app brand="" client="ms-unknown" appid="{387E11AD-7109-45F6-83CF-CAA241ADC9DF}" version="103.0.5060.71" nextversion="" lang="en-US" installage="73" ap="chrome;google;sdk_gphone64_arm64"><updatecheck /><ping active="1" ad="6555" rd="6555" /></app></request>
2025/01/24 11:14:20 [http response] Chunked response body
2025-01-24T11:14:20Z ??? UUID:2229_2940_ThreadPoolForeg_0_0_0.0.0.0:0-0.0.0.0:0, Name:HTTPResponse, Type:3, Length:896
HTTP/1.1 200 OK
Transfer-Encoding: chunked
Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Content-Encoding: gzip
Content-Security-Policy: script-src 'report-sample' 'none';report-uri https://csp.withgoogle.com/csp/clientupdate-aus/1
Content-Type: text/xml; charset=UTF-8
Date: Fri, 24 Jan 2025 11:14:18 GMT
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Server: GSE
X-Content-Type-Options: nosniff
X-Daynum: 6598
X-Daystart: 11658
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
<?xml version="1.0" encoding="UTF-8"?><response protocol="3.0" server="prod"><daystart elapsed_days="6598" elapsed_seconds="11658"/><app appid="{387E11AD-7109-45F6-83CF-CAA241ADC9DF}" cohort="1:hyx:" cohortname="Stable Chrome" status="ok"><updatecheck status="noupdate"/><ping status="ok"/></app></response>
However, I cannot verify on Android 15 because the emulator's image cannot gain root access. |
ver 0.8.9 can`t work on android kernel 6.1.99 , but ver 0.6.1 did work
tried -b 0/1/2 all failed
./ecapture tls -b 1 -p 11515 --hex
should capture all the traffic but nothing showed off
tried version 0.6.1 that works fine
Linux Server/Android (please complete the following information):
The text was updated successfully, but these errors were encountered: