Closed
1 of 1 issue completedDescription
Hello. First of all, thank you for developing this tool!
I am trying to use eCapture on the Cuttlefish emulator using a custom built kernel (I just added KernelSU to the normal kernel). I gave my shell all the capabilities that are available and built the tool using the latest commit, which adds support for BoringSSL on Android 15. But I still cannot do it. I've seen that the application I'm trying to test uses the default libssl library.
I tried to use -b 0, 1, and 2, but nothing worked.
I can intercept traffic but when viewing it on Wireshark it's always encrypted. Adding a keylog file to output does not work because no output is done to it.
- Command I'm using:
./ecapture tls -m pcap -i buried_eth0 --pcapfile=ecapture.pcapng --keylogfile="ecapture_openssl_key.log" --libssl=/apex/com.android.conscrypt/lib64/libssl.so --ssl_version="boringssl_a_15"
- Device:
Cuttlefish emulator with Android 15
- Kernel Info:
Linux localhost 6.6.58-android15-8-maybe-dirty #1 SMP PREEMPT Thu Jan 1 00:00:00 UTC 1970 x86_64 Toybox
- eCapture Version:
linux_amd64:v0.9.3-20250206-4fc023c:6.12.11-1-MANJARO
Screenshots:
Do you think that using bpftrace is a good alternative?
Thank you in advance.