IOS Ethereal packet capture tool Stream-- let mobile terminal breeze Fiddler course easy to overlook tips

There came a day when evening to go home, when on the subway, development sent a message that can not be created before the bug and then look at the data capture. Suddenly my heart wanted, on the subway, I go on what capture. After the next Baidu, ios have found a very useful packet capture tool, you can download on the App Store, lightweight capture tool. Today to share the use of the basic tools under, in case of an emergency, need to temporarily capture, can also be a "emergency."

Man of few words said into the topic, let's look at Stream Home interface is not very simple, very simple to use.

Can be seen from the interface, the function is complete, a request may be constructed, arranged capture mode, there are embedded gadget.

Build request

We start talking about the build requests, build requests, including eight ways interface here, then brush up, use these eight requests ways.

1, Get request (request specifying page information, and returns the entity body) to a particular resource;

2, Post submitted to the designated resource data processing request (to submit the form, upload a file), and may lead to a revision of existing resources or establish new resources;

3, Put to upload their content to the latest specified resource location (replace the contents of the specified document transferring data from the client to the server from);

4, Head and server get request cable consistent with the corresponding, does not return the response body, obtaining the original information contained in a small message header (similar to the get request, the response is not returned details for obtaining header);

5, Delete to delete the server requests the request-URL indicated resources (server deletion request page);

6, Trace echo request received by the server, for testing and diagnosis;

7, opions supported by the server returns an HTML request for a particular resource or a method of testing the web server sends * server function (server allows the client to view performance);

8, Connect HTTP / 1.1 protocol can be connected to the proxy server pipeline mode.

Construction of a GET request

We understand that the use of eight kinds of way request, and get the major share post request method today.

Stream request in the following manner, can be freely selected.

@ Warm pot of sake

Select get request, simulation request: Visit Park blog, link configuration requests: https: //account.cnblogs.com/user/userinfo

After the link configured, click the Start button

Request response is successful, we have to see what the response body, as follows:

Since there is no transmission token, it displays the unregistered state.

By postman verification, the results are consistent with the request, as follows:

Construction of a POST request

We first handover request method, is selected to POST, select POST, it will automatically display the contents of the request header, as follows:

body parameters, by adding a single field, the original data can also be added, after pasting data, automatically generates a list of fields

After configuring the data request, click the request button, a successful response to the request, as follows:

We view the body of the response data, as follows:

Normal to get a token

The method of selecting a post request, body can switch between different types, according to their interface to select the type of transmission parameters, options are: general form, JSON, form documents, general text type. As follows:

Ethereal practice

Install Certificate

Click Settings under the HTTPS packet capture, enter the following interface, copywriting tips is very clear, Ethereal need to install the CA certificate, the same as the fiddler.

The following interface is a installed the certificate and trust, ios how to trust a certificate, you can refer to my previous post: Fiddler course easy to overlook tips , there are detailed introduction.

Installed the certificate, then you can get caught up.

Fetch requests

In the app page, click the Start capture is automatically enabled VPN services to access the corresponding data, you can normally get caught, it is not very simple. As follows:

View Results

We requested to see the next catch, as follows:

history record

After the capture, you can also view the capture history, crawl interface, you can view the data repeatedly, as follows:

Collection Request

In the capture process, one would like a single interface to request attention response value, the interface may be the collection, mark up as follows:

Set packet capture mode

Blacklist

Click interface settings capture mode, enter into setting interface, as follows:

We can see that the use of white and black lists from the figure, and when set to black, all the fetch request; if set specific blacklist fetch request is in addition to the specific interface data blacklist.

Specifically we operate, configure blacklist, black list can not be opened simultaneously.

Park will host blog configuration blacklist, supports wildcards *, different URLs different pages of blog park, but the suffix is ​​the same, so configured * .cnblogs.com, as shown below:

From the Baidu page, visit the blog park, we look to grab the data as follows:

Perfect avoid all access requests on blog Park record, this is the role of the blacklist.

Whitelist

We understand the role of the blacklist, look at the role of the white list, before also talked about the role of the white list, is the value of the crawl host requests within specific whitelist, our specific point of view.

The blog host Park configured into whitelist, as follows:

We come back content access blog content park, crawled as follows:

From the graph we can see that crawled interface, the interface is requested on blog Park, this is the role of the white list. In order not to obscure or excessive request interface, to disrupt their own, can be configured whitelist.

Ethereal log

In the capture process, you can also view real-time capture of logs can be analyzed correspond to the problem.

Common tools

In the common interface of the tool, which has small tools are often used, URL encoding and decoding, Base64 encryption and decryption, MD5, the time stamp conversion, the RSA encryption and decryption.

Tools specific application, you can try some.

postscript

Stream, personally think that the mobile terminal is a very useful tool in case of an emergency, you need to analyze the troubleshooting time, you can easily use them, do not go looking for urgent computer.

 

This article represents only the author point of view, the Department published author @ warm pot of sake. 
Welcome to reprint, but without the author's consent declared by this section must be retained, and given the original connection in the apparent position of the article page, otherwise the right to pursue legal responsibilities.
Article Source: http://www.cnblogs.com/hong-fithing/

Guess you like

Origin www.cnblogs.com/hong-fithing/p/12562448.html