ANDROIDDUMP(1) | The Wireshark Network Analyzer | ANDROIDDUMP(1) |
androiddump - Provide interfaces to capture from Android devices
androiddump [ --help ] [ --version ] [ --extcap-version ] [ --debug ] [ --extcap-interfaces ] [ --extcap-dlts ] [ --extcap-interface=<interface> ] [ --extcap-config ] [ --capture ] [ --fifo=<path to file or pipe> ] [ --adb-server-ip=<IP address> ] [ --adb-server-tcp-port=<TCP port> ] [ --logcat-text=<TRUE or FALSE> ] [ --bt-server-tcp-port=<TCP port> ] [ --bt-forward-socket=<TRUE or FALSE> ] [ --bt-local-ip=<IP address> ] [ --bt-local-tcp-port=<TCP port> ]
androiddump --extcap-interfaces [ --adb-server-ip=<IP address> ] [ --adb-server-tcp-port=<TCP port> ]
androiddump --extcap-interface=<interface> [ --extcap-dlts ]
androiddump --extcap-interface=<interface> [ --extcap-config ]
androiddump --extcap-interface=<interface> --fifo=<path to file or pipe> --capture
Androiddump is a extcap tool that provide interfaces to capture from Android device. There is only two requirements:
1. You must have Android SDK and add it PATH environment variable. PATH should contain directory with tools like "adb" and "android". Android SDK for various platform are available on: https://developer.android.com/sdk/index.html#Other
2. You must have permission to Android devices. Some Android devices requires on-screen authentication.
Supported interfaces:
Please note that it will work also for FirefoxOS or other Android-based stuffs.
Defaults to FALSE.
Defaults to FALSE.
To see program arguments:
androiddump --help
To see program version:
androiddump --version
To see interfaces:
androiddump --extcap-interfaces Example output: interface {display=Android Logcat Main unknown MSM7627A}{value=android-logcat-main-MSM7627A} interface {display=Android Logcat System unknown MSM7627A}{value=android-logcat-system-MSM7627A} interface {display=Android Logcat Radio unknown MSM7627A}{value=android-logcat-radio-MSM7627A} interface {display=Android Logcat Events unknown MSM7627A}{value=android-logcat-events-MSM7627A} interface {display=Android Bluetooth Hcidump unknown MSM7627A}{value=android-bluetooth-hcidump-MSM7627A} Human-readable display name of interfaces contains interface type, one of: android-logcat-main (Android Logcat Main) android-logcat-system (Android Logcat System) android-logcat-radio (Android Logcat Radio) android-logcat-events (Android Logcat Events) android-logcat-text-main (Android Logcat Main) android-logcat-text-system (Android Logcat System) android-logcat-text-radio (Android Logcat Radio) android-logcat-text-events (Android Logcat Events) android-logcat-text-crash (Android Logcat Crash) android-bluetooth-hcidump (Android Bluetooth Hcidump) android-bluetooth-external-parser (Android Bluetooth External Parser) android-bluetooth-btsnoop-net (Android Bluetooth Btsnoop Net) android-wifi-tcpdump (Android WiFi) Then Android Device's name if available, otherwise "unknown". Last part of it is DeviceID - the identificator of the device provided by Android SDK (see "adb devices"). For example: "Android Logcat Main unknown MSM7627A" "Android Logcat Main" - user-friendly type of interface "unknown" - name of Android Device "MSM7627A" - device ID
To see interface DLTs:
androiddump --extcap-interface=android-bluetooth-hcidump-MSM7627A --extcap-dlts Example output: dlt {number=99}{name=BluetoothH4}{display=Bluetooth HCI UART transport layer plus pseudo-header}
To see interface configuration options:
androiddump --extcap-interface=android-bluetooth-hcidump-MSM7627A --extcap-config Example output: arg {number=0}{call=--adb-server-ip}{display=ADB Server IP Address}{type=string}{default=127.0.0.1} arg {number=1}{call=--adb-server-tcp-port}{display=ADB Server TCP Port}{type=integer}{range=0,65535}{default=5037}
To capture:
androiddump --extcap-interface=android-bluetooth-hcidump-MSM7627A --fifo=/tmp/bluetooth.pcapng --capture
NOTE: To stop capturing CTRL+C/kill/terminate application.
Androiddump is part of the Wireshark distribution. The latest version of Wireshark can be found at <https://www.wireshark.org>.
HTML versions of the Wireshark project man pages are available at: <https://www.wireshark.org/docs/man-pages>.
Original Author -------- ------ Michal Labedzki <michal.labedzki[AT]tieto.com> Contributors ------------ Roland Knall <rknall[AT]gmail.com>
2021-12-09 | 3.4.10 |