How can I view the traffic of this application? Unicorn Meta Zoo #1: Why another podcast? ...

Is there metaphorical meaning of "aus der Haft entlassen"?

Is there any pythonic way to find average of specific tuple elements in array?

How to avoid introduction cliches

How can I practically buy stocks?

How can I wire a 9-position switch so that each position turns on one more LED than the one before?

Older movie/show about humans on derelict alien warship which refuels by passing through a star

How to keep bees out of canned beverages?

Obeylines and gappto from etoolbox

A strange hotel

Should the Product Owner dictate what info the UI needs to display?

Suing a Police Officer Instead of the Police Department

All ASCII characters with a given bit count

Why did C use the -> operator instead of reusing the . operator?

How do I reattach a shelf to the wall when it ripped out of the wall?

Why doesn't the standard consider a template constructor as a copy constructor?

Is Diceware more secure than a long passphrase?

What to do with someone that cheated their way through university and a PhD program?

Sharepoint Designer Discontinuation - software to modify existing workflows

Crossed out red box fitting tightly around image

Do I need to watch Ant-Man and the Wasp and Captain Marvel before watching Avengers: Endgame?

Bayes factor vs P value

My bank got bought out, am I now going to have to start filing tax returns in a different state?

"Whatever a Russian does, they end up making the Kalashnikov gun"? Are there any similar proverbs in English?

Why does Arg'[1. + I] return -0.5?



How can I view the traffic of this application?



Unicorn Meta Zoo #1: Why another podcast?
Announcing the arrival of Valued Associate #679: Cesar ManaraHow to monitor traffic passing through my Wi-Fi access pointUnable to capture outgoing traffic with Wireshark on wi-fi networkWireshark Not Displaying Packets From Other Network Devices, Even in Promisc ModeCapturing Internet Connection Sharing (ICS) traffic using FiddlerWhich Wireshark settings to see connections from phoneLooking for a tool to inspect HTTP data between a mobile phone and AV receiverCapture WiFi traffic from my own networkiptables rules for mitmproxySniff wireless traffic between two machines via WiresharkHow I can capture the traffic of my smartphone or tablet





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







0















I have a mobile app which connects to my cars wifi and reports data on it.
The app must be connected to the AP the car provides in order to work - I have tested whether the car connects to a public internet api and the phone retrieves this data but this is not the case. It seems that phone directly connects to the car (via the provided AP) in some way.



I am trying to see the network traffic here to replicate the functionality outside of the provided app.



Things I have tried:



Viewing HTTP and HTTPS traffic via Proxy (running app via proxy)



To do this, I connected the phone directly to the AP as required but proxied the phones HTTP and HTTPS traffic via mitmproxy running on a laptop on the same network. Running the app showed traffic but not for the related items Im after (which update in the app)



Running wireshark



I ran wireshark on a laptop connected to the same network (as described above) and captured all traffic. I then loaded the app and reviewed the capture. There seemed to be no direct network connectivty between the devices. There was a broadcast message from the AP, giving an address and description of an API but the phone never seems to then connect to this - I think it may be irrelevant for my needs.
(I tried to telnet to the address/port described and it returned what looked like xml, but i was unable to send any traffic to get any more information)



Neither method I have tried seems to show meaningful traffic between the two devices.



Is there something obvious Ive missed? What else can I try to view the phone communicating with the car?










share|improve this question

























  • Can you edit your question to include more detail about the two things you tried? Like how did you insert a proxy between your phone and the car AP if the phone has to connect directly to the car AP? Also, for the Wireshark attempt, did you capture and successfully decrypt any Data (QoS-Data) frames at all? Capturing traffic on Wi-Fi is tricky, and without knowing the tricks, you're doomed to fail. A Wireshark monitor-mode packet capture might still be the best path to success, but you may need to learn some things about how to do it right.

    – Spiff
    23 hours ago











  • @Spiff have updated with more detail.

    – Andrew Hall
    22 hours ago


















0















I have a mobile app which connects to my cars wifi and reports data on it.
The app must be connected to the AP the car provides in order to work - I have tested whether the car connects to a public internet api and the phone retrieves this data but this is not the case. It seems that phone directly connects to the car (via the provided AP) in some way.



I am trying to see the network traffic here to replicate the functionality outside of the provided app.



Things I have tried:



Viewing HTTP and HTTPS traffic via Proxy (running app via proxy)



To do this, I connected the phone directly to the AP as required but proxied the phones HTTP and HTTPS traffic via mitmproxy running on a laptop on the same network. Running the app showed traffic but not for the related items Im after (which update in the app)



Running wireshark



I ran wireshark on a laptop connected to the same network (as described above) and captured all traffic. I then loaded the app and reviewed the capture. There seemed to be no direct network connectivty between the devices. There was a broadcast message from the AP, giving an address and description of an API but the phone never seems to then connect to this - I think it may be irrelevant for my needs.
(I tried to telnet to the address/port described and it returned what looked like xml, but i was unable to send any traffic to get any more information)



Neither method I have tried seems to show meaningful traffic between the two devices.



Is there something obvious Ive missed? What else can I try to view the phone communicating with the car?










share|improve this question

























  • Can you edit your question to include more detail about the two things you tried? Like how did you insert a proxy between your phone and the car AP if the phone has to connect directly to the car AP? Also, for the Wireshark attempt, did you capture and successfully decrypt any Data (QoS-Data) frames at all? Capturing traffic on Wi-Fi is tricky, and without knowing the tricks, you're doomed to fail. A Wireshark monitor-mode packet capture might still be the best path to success, but you may need to learn some things about how to do it right.

    – Spiff
    23 hours ago











  • @Spiff have updated with more detail.

    – Andrew Hall
    22 hours ago














0












0








0








I have a mobile app which connects to my cars wifi and reports data on it.
The app must be connected to the AP the car provides in order to work - I have tested whether the car connects to a public internet api and the phone retrieves this data but this is not the case. It seems that phone directly connects to the car (via the provided AP) in some way.



I am trying to see the network traffic here to replicate the functionality outside of the provided app.



Things I have tried:



Viewing HTTP and HTTPS traffic via Proxy (running app via proxy)



To do this, I connected the phone directly to the AP as required but proxied the phones HTTP and HTTPS traffic via mitmproxy running on a laptop on the same network. Running the app showed traffic but not for the related items Im after (which update in the app)



Running wireshark



I ran wireshark on a laptop connected to the same network (as described above) and captured all traffic. I then loaded the app and reviewed the capture. There seemed to be no direct network connectivty between the devices. There was a broadcast message from the AP, giving an address and description of an API but the phone never seems to then connect to this - I think it may be irrelevant for my needs.
(I tried to telnet to the address/port described and it returned what looked like xml, but i was unable to send any traffic to get any more information)



Neither method I have tried seems to show meaningful traffic between the two devices.



Is there something obvious Ive missed? What else can I try to view the phone communicating with the car?










share|improve this question
















I have a mobile app which connects to my cars wifi and reports data on it.
The app must be connected to the AP the car provides in order to work - I have tested whether the car connects to a public internet api and the phone retrieves this data but this is not the case. It seems that phone directly connects to the car (via the provided AP) in some way.



I am trying to see the network traffic here to replicate the functionality outside of the provided app.



Things I have tried:



Viewing HTTP and HTTPS traffic via Proxy (running app via proxy)



To do this, I connected the phone directly to the AP as required but proxied the phones HTTP and HTTPS traffic via mitmproxy running on a laptop on the same network. Running the app showed traffic but not for the related items Im after (which update in the app)



Running wireshark



I ran wireshark on a laptop connected to the same network (as described above) and captured all traffic. I then loaded the app and reviewed the capture. There seemed to be no direct network connectivty between the devices. There was a broadcast message from the AP, giving an address and description of an API but the phone never seems to then connect to this - I think it may be irrelevant for my needs.
(I tried to telnet to the address/port described and it returned what looked like xml, but i was unable to send any traffic to get any more information)



Neither method I have tried seems to show meaningful traffic between the two devices.



Is there something obvious Ive missed? What else can I try to view the phone communicating with the car?







networking wireless-networking proxy wireshark sniffing






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited 22 hours ago







Andrew Hall

















asked 23 hours ago









Andrew HallAndrew Hall

14019




14019













  • Can you edit your question to include more detail about the two things you tried? Like how did you insert a proxy between your phone and the car AP if the phone has to connect directly to the car AP? Also, for the Wireshark attempt, did you capture and successfully decrypt any Data (QoS-Data) frames at all? Capturing traffic on Wi-Fi is tricky, and without knowing the tricks, you're doomed to fail. A Wireshark monitor-mode packet capture might still be the best path to success, but you may need to learn some things about how to do it right.

    – Spiff
    23 hours ago











  • @Spiff have updated with more detail.

    – Andrew Hall
    22 hours ago



















  • Can you edit your question to include more detail about the two things you tried? Like how did you insert a proxy between your phone and the car AP if the phone has to connect directly to the car AP? Also, for the Wireshark attempt, did you capture and successfully decrypt any Data (QoS-Data) frames at all? Capturing traffic on Wi-Fi is tricky, and without knowing the tricks, you're doomed to fail. A Wireshark monitor-mode packet capture might still be the best path to success, but you may need to learn some things about how to do it right.

    – Spiff
    23 hours ago











  • @Spiff have updated with more detail.

    – Andrew Hall
    22 hours ago

















Can you edit your question to include more detail about the two things you tried? Like how did you insert a proxy between your phone and the car AP if the phone has to connect directly to the car AP? Also, for the Wireshark attempt, did you capture and successfully decrypt any Data (QoS-Data) frames at all? Capturing traffic on Wi-Fi is tricky, and without knowing the tricks, you're doomed to fail. A Wireshark monitor-mode packet capture might still be the best path to success, but you may need to learn some things about how to do it right.

– Spiff
23 hours ago





Can you edit your question to include more detail about the two things you tried? Like how did you insert a proxy between your phone and the car AP if the phone has to connect directly to the car AP? Also, for the Wireshark attempt, did you capture and successfully decrypt any Data (QoS-Data) frames at all? Capturing traffic on Wi-Fi is tricky, and without knowing the tricks, you're doomed to fail. A Wireshark monitor-mode packet capture might still be the best path to success, but you may need to learn some things about how to do it right.

– Spiff
23 hours ago













@Spiff have updated with more detail.

– Andrew Hall
22 hours ago





@Spiff have updated with more detail.

– Andrew Hall
22 hours ago










1 Answer
1






active

oldest

votes


















1














Using Wireshark to capture unicast traffic between two other devices on an 802.11 network requires using 802.11 monitor mode, which is tricky to pull off. If you were only capturing in promiscuous mode (which is common for wired Ethernet packet captures on hubs or via port mirroring on managed switches), then you wouldn't have seen any unicast traffic to/from other wireless devices.



You should read up on the Wireshark site about how to do 802.11 monitor mode packet captures, and how to decrypt the unicast data frames you capture, if the network uses WPA2-PSK (or original WPA-PSK or even WEP).



Here are some highlights of what you need to deal with:




  • In your Wireshark machine, you must have a WNIC and driver that supports 802.11 monitor mode.

  • Your monitor-mode-capable WNIC must support all the same flavors of 802.11 transmissions that your AP and the target wireless device (your phone) support. For example, if your AP and phone both support 802.11ac, but your monitor mode WNIC doesn't, it won't be able to receive those 802.11ac transmissions. Even if all three devices support 802.11ac, if the AP and phone support, say, 2 spatial streams (a.k.a. "2x2:2"), but your monitor mode WNIC only supports 1 spatial stream (1x1:1), then your Wireshark machine won't be able to see anything your phone or AP transmit using 2 spatial streams.

  • If your Wireshark machine is too far from the AP and wireless client, it might not get enough signal strength to be able to receive the packets reliably.

  • If your car's AP uses WPA2-PSK (or original WPA-PSK), and you have no option to disable security, then in order to decrypt traffic to/from the phone, you must capture the WPA2-PSK 4-way handshake that happens when the phone joins the network. Capturing that handshake, and knowing the PSK or passphrase for the network, allows you to decrypt all of the packets you capture from that session. But if the phone falls asleep or otherwise leaves and rejoins the network, that's a new session and you'll need to be sure to capture the WPA2 4-way handshake for that new session if you want to decrypt any of the packets from that new session.






share|improve this answer


























  • Thanks @Spiff -this is great information and very helpful to me. I have one followup Q: If i ran the app on the laptop running wireshark via an emaulator for example, would that negate the need for monitor mode as the packets would be coming directly to the same device?

    – Andrew Hall
    9 hours ago











  • @AndrewHall Yes, capturing traffic to/from your own device doesn't even require promiscuous mode, let alone monitor mode.

    – Spiff
    2 hours ago














Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1429218%2fhow-can-i-view-the-traffic-of-this-application%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









1














Using Wireshark to capture unicast traffic between two other devices on an 802.11 network requires using 802.11 monitor mode, which is tricky to pull off. If you were only capturing in promiscuous mode (which is common for wired Ethernet packet captures on hubs or via port mirroring on managed switches), then you wouldn't have seen any unicast traffic to/from other wireless devices.



You should read up on the Wireshark site about how to do 802.11 monitor mode packet captures, and how to decrypt the unicast data frames you capture, if the network uses WPA2-PSK (or original WPA-PSK or even WEP).



Here are some highlights of what you need to deal with:




  • In your Wireshark machine, you must have a WNIC and driver that supports 802.11 monitor mode.

  • Your monitor-mode-capable WNIC must support all the same flavors of 802.11 transmissions that your AP and the target wireless device (your phone) support. For example, if your AP and phone both support 802.11ac, but your monitor mode WNIC doesn't, it won't be able to receive those 802.11ac transmissions. Even if all three devices support 802.11ac, if the AP and phone support, say, 2 spatial streams (a.k.a. "2x2:2"), but your monitor mode WNIC only supports 1 spatial stream (1x1:1), then your Wireshark machine won't be able to see anything your phone or AP transmit using 2 spatial streams.

  • If your Wireshark machine is too far from the AP and wireless client, it might not get enough signal strength to be able to receive the packets reliably.

  • If your car's AP uses WPA2-PSK (or original WPA-PSK), and you have no option to disable security, then in order to decrypt traffic to/from the phone, you must capture the WPA2-PSK 4-way handshake that happens when the phone joins the network. Capturing that handshake, and knowing the PSK or passphrase for the network, allows you to decrypt all of the packets you capture from that session. But if the phone falls asleep or otherwise leaves and rejoins the network, that's a new session and you'll need to be sure to capture the WPA2 4-way handshake for that new session if you want to decrypt any of the packets from that new session.






share|improve this answer


























  • Thanks @Spiff -this is great information and very helpful to me. I have one followup Q: If i ran the app on the laptop running wireshark via an emaulator for example, would that negate the need for monitor mode as the packets would be coming directly to the same device?

    – Andrew Hall
    9 hours ago











  • @AndrewHall Yes, capturing traffic to/from your own device doesn't even require promiscuous mode, let alone monitor mode.

    – Spiff
    2 hours ago


















1














Using Wireshark to capture unicast traffic between two other devices on an 802.11 network requires using 802.11 monitor mode, which is tricky to pull off. If you were only capturing in promiscuous mode (which is common for wired Ethernet packet captures on hubs or via port mirroring on managed switches), then you wouldn't have seen any unicast traffic to/from other wireless devices.



You should read up on the Wireshark site about how to do 802.11 monitor mode packet captures, and how to decrypt the unicast data frames you capture, if the network uses WPA2-PSK (or original WPA-PSK or even WEP).



Here are some highlights of what you need to deal with:




  • In your Wireshark machine, you must have a WNIC and driver that supports 802.11 monitor mode.

  • Your monitor-mode-capable WNIC must support all the same flavors of 802.11 transmissions that your AP and the target wireless device (your phone) support. For example, if your AP and phone both support 802.11ac, but your monitor mode WNIC doesn't, it won't be able to receive those 802.11ac transmissions. Even if all three devices support 802.11ac, if the AP and phone support, say, 2 spatial streams (a.k.a. "2x2:2"), but your monitor mode WNIC only supports 1 spatial stream (1x1:1), then your Wireshark machine won't be able to see anything your phone or AP transmit using 2 spatial streams.

  • If your Wireshark machine is too far from the AP and wireless client, it might not get enough signal strength to be able to receive the packets reliably.

  • If your car's AP uses WPA2-PSK (or original WPA-PSK), and you have no option to disable security, then in order to decrypt traffic to/from the phone, you must capture the WPA2-PSK 4-way handshake that happens when the phone joins the network. Capturing that handshake, and knowing the PSK or passphrase for the network, allows you to decrypt all of the packets you capture from that session. But if the phone falls asleep or otherwise leaves and rejoins the network, that's a new session and you'll need to be sure to capture the WPA2 4-way handshake for that new session if you want to decrypt any of the packets from that new session.






share|improve this answer


























  • Thanks @Spiff -this is great information and very helpful to me. I have one followup Q: If i ran the app on the laptop running wireshark via an emaulator for example, would that negate the need for monitor mode as the packets would be coming directly to the same device?

    – Andrew Hall
    9 hours ago











  • @AndrewHall Yes, capturing traffic to/from your own device doesn't even require promiscuous mode, let alone monitor mode.

    – Spiff
    2 hours ago
















1












1








1







Using Wireshark to capture unicast traffic between two other devices on an 802.11 network requires using 802.11 monitor mode, which is tricky to pull off. If you were only capturing in promiscuous mode (which is common for wired Ethernet packet captures on hubs or via port mirroring on managed switches), then you wouldn't have seen any unicast traffic to/from other wireless devices.



You should read up on the Wireshark site about how to do 802.11 monitor mode packet captures, and how to decrypt the unicast data frames you capture, if the network uses WPA2-PSK (or original WPA-PSK or even WEP).



Here are some highlights of what you need to deal with:




  • In your Wireshark machine, you must have a WNIC and driver that supports 802.11 monitor mode.

  • Your monitor-mode-capable WNIC must support all the same flavors of 802.11 transmissions that your AP and the target wireless device (your phone) support. For example, if your AP and phone both support 802.11ac, but your monitor mode WNIC doesn't, it won't be able to receive those 802.11ac transmissions. Even if all three devices support 802.11ac, if the AP and phone support, say, 2 spatial streams (a.k.a. "2x2:2"), but your monitor mode WNIC only supports 1 spatial stream (1x1:1), then your Wireshark machine won't be able to see anything your phone or AP transmit using 2 spatial streams.

  • If your Wireshark machine is too far from the AP and wireless client, it might not get enough signal strength to be able to receive the packets reliably.

  • If your car's AP uses WPA2-PSK (or original WPA-PSK), and you have no option to disable security, then in order to decrypt traffic to/from the phone, you must capture the WPA2-PSK 4-way handshake that happens when the phone joins the network. Capturing that handshake, and knowing the PSK or passphrase for the network, allows you to decrypt all of the packets you capture from that session. But if the phone falls asleep or otherwise leaves and rejoins the network, that's a new session and you'll need to be sure to capture the WPA2 4-way handshake for that new session if you want to decrypt any of the packets from that new session.






share|improve this answer















Using Wireshark to capture unicast traffic between two other devices on an 802.11 network requires using 802.11 monitor mode, which is tricky to pull off. If you were only capturing in promiscuous mode (which is common for wired Ethernet packet captures on hubs or via port mirroring on managed switches), then you wouldn't have seen any unicast traffic to/from other wireless devices.



You should read up on the Wireshark site about how to do 802.11 monitor mode packet captures, and how to decrypt the unicast data frames you capture, if the network uses WPA2-PSK (or original WPA-PSK or even WEP).



Here are some highlights of what you need to deal with:




  • In your Wireshark machine, you must have a WNIC and driver that supports 802.11 monitor mode.

  • Your monitor-mode-capable WNIC must support all the same flavors of 802.11 transmissions that your AP and the target wireless device (your phone) support. For example, if your AP and phone both support 802.11ac, but your monitor mode WNIC doesn't, it won't be able to receive those 802.11ac transmissions. Even if all three devices support 802.11ac, if the AP and phone support, say, 2 spatial streams (a.k.a. "2x2:2"), but your monitor mode WNIC only supports 1 spatial stream (1x1:1), then your Wireshark machine won't be able to see anything your phone or AP transmit using 2 spatial streams.

  • If your Wireshark machine is too far from the AP and wireless client, it might not get enough signal strength to be able to receive the packets reliably.

  • If your car's AP uses WPA2-PSK (or original WPA-PSK), and you have no option to disable security, then in order to decrypt traffic to/from the phone, you must capture the WPA2-PSK 4-way handshake that happens when the phone joins the network. Capturing that handshake, and knowing the PSK or passphrase for the network, allows you to decrypt all of the packets you capture from that session. But if the phone falls asleep or otherwise leaves and rejoins the network, that's a new session and you'll need to be sure to capture the WPA2 4-way handshake for that new session if you want to decrypt any of the packets from that new session.







share|improve this answer














share|improve this answer



share|improve this answer








edited 2 hours ago

























answered 21 hours ago









SpiffSpiff

78.6k10121166




78.6k10121166













  • Thanks @Spiff -this is great information and very helpful to me. I have one followup Q: If i ran the app on the laptop running wireshark via an emaulator for example, would that negate the need for monitor mode as the packets would be coming directly to the same device?

    – Andrew Hall
    9 hours ago











  • @AndrewHall Yes, capturing traffic to/from your own device doesn't even require promiscuous mode, let alone monitor mode.

    – Spiff
    2 hours ago





















  • Thanks @Spiff -this is great information and very helpful to me. I have one followup Q: If i ran the app on the laptop running wireshark via an emaulator for example, would that negate the need for monitor mode as the packets would be coming directly to the same device?

    – Andrew Hall
    9 hours ago











  • @AndrewHall Yes, capturing traffic to/from your own device doesn't even require promiscuous mode, let alone monitor mode.

    – Spiff
    2 hours ago



















Thanks @Spiff -this is great information and very helpful to me. I have one followup Q: If i ran the app on the laptop running wireshark via an emaulator for example, would that negate the need for monitor mode as the packets would be coming directly to the same device?

– Andrew Hall
9 hours ago





Thanks @Spiff -this is great information and very helpful to me. I have one followup Q: If i ran the app on the laptop running wireshark via an emaulator for example, would that negate the need for monitor mode as the packets would be coming directly to the same device?

– Andrew Hall
9 hours ago













@AndrewHall Yes, capturing traffic to/from your own device doesn't even require promiscuous mode, let alone monitor mode.

– Spiff
2 hours ago







@AndrewHall Yes, capturing traffic to/from your own device doesn't even require promiscuous mode, let alone monitor mode.

– Spiff
2 hours ago




















draft saved

draft discarded




















































Thanks for contributing an answer to Super User!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1429218%2fhow-can-i-view-the-traffic-of-this-application%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

VNC viewer RFB protocol error: bad desktop size 0x0I Cannot Type the Key 'd' (lowercase) in VNC Viewer...

Tribunal Administrativo e Fiscal de Mirandela Referências Menu de...

looking for continuous Screen Capture for retroactivly reproducing errors, timeback machineRolling desktop...