# Description
**Utility for sniffing SSL/TLS encrypted traffic on a darwin-based platforms.**
`CFNetwork.framework` contains a debug/verbosity global, enforcing a dump of every packet transferred through it, to be
logged into device syslog in plaintext form. In order to have a nicer view with clean control flow of this traffic, we
attach each such packet appropriate TCP flags and write it back into a PCAP file.
This allows us to later dissect this traffic using popular and convenient tools (e.g. Wireshark 🦈).
On iOS, this will require a jailbroken iOS device.
# Installation
```shell
python3 -m pip install -U darwin-ssl-sniffer
```
# Usage
## Local macOS machine
Simply execute:
```shell
# output file can be given using the -o option (traffic.pcapng by default)
python3 -m darwin_ssl_sniffer sniff
```
## Jailbroken iOS device
- Download and install [`rpcserver`](https://rpc-project.readthedocs.io/en/latest/getting_started/installation.html) on
a jailbroken device.
- Execute:
```shell
python3 -m darwin_ssl_sniffer mobile setup -p 5910
```
This step should be performed only once on the device. The first time will require a device reboot (you will be
prompted to if this is indeed the first time).
- Execute:
```shell
# output file can be given using the -o option (traffic.pcapng by default)
python3 -m darwin_ssl_sniffer mobile sniff
```
Raw data
{
"_id": null,
"home_page": "",
"name": "darwin-ssl-sniffer",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": "netanelc305 <netanelc305@protonmail.com>, doronz88 <doron88@gmail.com>",
"keywords": "ios,jailbreak,ssl,sniffer,tls,cli,automation,darwin,osx,macos",
"author": "",
"author_email": "netanelc305 <netanelc305@protonmail.com>, doronz88 <doron88@gmail.com>",
"download_url": "https://files.pythonhosted.org/packages/32/27/c72e32267c8e3c403eaf623ff73e1973d80ea55c3a10d4480de051cc7489/darwin-ssl-sniffer-0.0.4.tar.gz",
"platform": null,
"description": "# Description\n\n**Utility for sniffing SSL/TLS encrypted traffic on a darwin-based platforms.**\n\n`CFNetwork.framework` contains a debug/verbosity global, enforcing a dump of every packet transferred through it, to be\nlogged into device syslog in plaintext form. In order to have a nicer view with clean control flow of this traffic, we\nattach each such packet appropriate TCP flags and write it back into a PCAP file.\n\nThis allows us to later dissect this traffic using popular and convenient tools (e.g. Wireshark \ud83e\udd88).\n\nOn iOS, this will require a jailbroken iOS device.\n\n# Installation\n\n```shell\npython3 -m pip install -U darwin-ssl-sniffer\n```\n\n# Usage\n\n## Local macOS machine\n\nSimply execute:\n\n```shell\n# output file can be given using the -o option (traffic.pcapng by default)\npython3 -m darwin_ssl_sniffer sniff\n```\n\n## Jailbroken iOS device\n\n- Download and install [`rpcserver`](https://rpc-project.readthedocs.io/en/latest/getting_started/installation.html) on\n a jailbroken device.\n- Execute:\n ```shell\n python3 -m darwin_ssl_sniffer mobile setup -p 5910\n ```\n This step should be performed only once on the device. The first time will require a device reboot (you will be\n prompted to if this is indeed the first time).\n- Execute:\n ```shell\n # output file can be given using the -o option (traffic.pcapng by default)\n python3 -m darwin_ssl_sniffer mobile sniff\n ```\n\n\n\n\n\n",
"bugtrack_url": null,
"license": "",
"summary": "Sniffer for encrypted traffic on darwin-based platforms",
"version": "0.0.4",
"project_urls": {
"Bug Reports": "https://github.com/netanelc305/Darwin_SSL_sniffer/issues",
"Homepage": "https://github.com/netanelc305/Darwin_SSL_sniffer"
},
"split_keywords": [
"ios",
"jailbreak",
"ssl",
"sniffer",
"tls",
"cli",
"automation",
"darwin",
"osx",
"macos"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "402c51ced78d9556d358dcfecb955d05e556bd5e7393e34fae0f41325cc955e9",
"md5": "f071998bd02c55f88e9eb145f3632914",
"sha256": "0d5d218b5b035707aebd0d450bd58452b89503bd6fd3cb752bba0e8e0f49a5c3"
},
"downloads": -1,
"filename": "darwin_ssl_sniffer-0.0.4-py3-none-any.whl",
"has_sig": false,
"md5_digest": "f071998bd02c55f88e9eb145f3632914",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.8",
"size": 8741,
"upload_time": "2024-01-29T13:15:35",
"upload_time_iso_8601": "2024-01-29T13:15:35.296901Z",
"url": "https://files.pythonhosted.org/packages/40/2c/51ced78d9556d358dcfecb955d05e556bd5e7393e34fae0f41325cc955e9/darwin_ssl_sniffer-0.0.4-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "3227c72e32267c8e3c403eaf623ff73e1973d80ea55c3a10d4480de051cc7489",
"md5": "6d3d46c1391225681eb18767362d02f1",
"sha256": "0b7994f4d45be1fc38c5059cdc41a0ae7e0c055fdc552e652d2c17fe0460b7ea"
},
"downloads": -1,
"filename": "darwin-ssl-sniffer-0.0.4.tar.gz",
"has_sig": false,
"md5_digest": "6d3d46c1391225681eb18767362d02f1",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 11573,
"upload_time": "2024-01-29T13:15:37",
"upload_time_iso_8601": "2024-01-29T13:15:37.527768Z",
"url": "https://files.pythonhosted.org/packages/32/27/c72e32267c8e3c403eaf623ff73e1973d80ea55c3a10d4480de051cc7489/darwin-ssl-sniffer-0.0.4.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-01-29 13:15:37",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "netanelc305",
"github_project": "Darwin_SSL_sniffer",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [],
"lcname": "darwin-ssl-sniffer"
}