I think you must have experienced the situation that you can’t catch the packet or the key packet when you grab the APP data at ordinary times. Today I will share with you this packet capture tool Drony is just one of the many cases that you can’t catch the packet.

First, let’s briefly introduce the NO_PROXY pattern: in the app package, set a NO_PROXY property for the interface part of the network request, such as the following, the figure is from a blogger’s article:

The important part is just that little bit:.proxy(proxy.no_proxy)

If.proxy (proxy.no_proxy) is used to set the “no Proxy” mode, then whatever proxy-based package capture tool you use will not work

Today, we will introduce the use of the Drony tool through an APP example

Drony download: https://files.cnblogs.com/fil… Note: After the installation of the advanced version of Android, it can not be used normally. I installed it directly in the simulator

First we use the normal packet capture process: we grab the packet through Fiddler, and you can see that we only catch some pictures and a bunch of unusable files

There is another way to determine whether an APP is in proxy-free request mode: Take Fiddler as an example. When the Fiddler certificate is configured and the emulator WiFi is configured with IP and port, the client turns off the Fiddler packet catching tool. If the APP still works normally, the request is in proxy-free request mode

In this case, we can use the Drony tool to force the APP to be proxied

Next comes the Drony tool configuration action:

  1. Open drony, swipe right, and slide to the setting screen

  1. Click on WiFi below!

  1. Select the WiFi of the network where you grab the packet tool. Since I am in the simulator here, it must be the only one

  1. The following configuration is in order. The IP and port here are the IP of the PC LAN of the PC where the packet capture tool is located, and the port of the packet capture tool. Here I use Fiddler, and the port is changed to 8889!

  1. Then slide down to Filter Default Value and select Allow All and then click Rules

  1. Configure a filter rule and press the plus sign on the right to create a new one

  1. Action select the Local Proxy Chain, and then Application select the target app. On the premise that you have installed the target app in the virtual machine and can open it normally and request data! Remember to save it at the end

  1. So that’s it, and then I’m going to go all the way back, back to Settings, and then I’m going to scroll left down to Log, and I’m going to click OFF, and I’m going to go from OFF to ON

Start caught

Drony just makes it listen, then tells it to start in the background, doesn’t kill it, opens the packet grabber tool, I have Fiddler here, and then opens your target app and uses the packet grabber tool to analyze:

We can already get the data we want. Okay, that’s all for today

This article is only used to share academic exchanges, if there is an infringement or there are mistakes in the article, please contact the blogger for changes.