Start Using SniffMaster for Packet Sniffing

SniffMaster currently supports proxy-based packet sniffing on both Mac and Windows, and offers full traffic sniffing, HTTPS brute-force sniffing, and HTTPS proxy sniffing for iOS devices.

Download and Installation

  1. Visit the official SniffMaster download page.
  2. Select the appropriate version: Windows for Windows users, or macOS for Mac users. SniffMaster is a portable software, so once downloaded and extracted, it is ready to use.
  3. When launching SniffMaster for the first time on Windows, you may be prompted to install or update the WebView2 runtime. Click Yes to proceed, and once the installation is complete, you can start using SniffMaster.
  4. Upon first launch, you might also be asked to install the iOS driver. Click OK and follow the on-screen instructions to install the iOS driver.

Registration and Login

SniffMaster’s basic features can be used without registration or login. Advanced features require login and registration.

  1. To log in, click the user login button in the top-right corner of the software, and enter your email and password.
  2. If you don’t have an account, click Register, and a verification email will be sent. Click the verification link in the email, then return to SniffMaster to log in.

Brute-force HTTPS Sniffing for iOS

Brute-force HTTPS sniffing allows you to capture HTTPS requests from iOS devices without setting up a proxy, and automatically decrypts HTTPS traffic. The app being captured must be signed with an iOS developer certificate. For unsigned apps (e.g., iOS system apps or certain third-party apps), only the request URL and headers will be visible; the body of the request and response will not be captured. PIN code checks and mutual certificate verification will not block or detect the use of brute-force sniffing.

To start:

  1. Connect your iOS device to your computer via USB.
  2. Select the device in SniffMaster and choose HTTPS Brute-force Sniffing from the features menu.
  3. Click Start. If you want to capture data from a specific app, click Select App to filter.

For detailed instructions, refer to the Brute-force Sniffing Tutorial.

Capturing iOS Data Traffic

iOS data traffic includes all network requests made by the device, such as HTTPS, socket communication, TCP, UDP, and DNS protocol packets.

To capture iOS data traffic:

  1. Connect your iOS device via USB and select it in SniffMaster.
  2. Choose Data Traffic Sniffing from the features menu and click Start.
  3. To capture data from a specific app, click Select App to filter.

For more details, see the Data Traffic Sniffing Tutorial.

Proxy-Based HTTPS Data Sniffing

Proxy sniffing is the traditional method for capturing packets and works well for most HTTPS requests. However, it cannot capture requests that involve certificate validation. This method requires installing and trusting a certificate on the device, and configuring a proxy, making it slightly more complex.

SniffMaster supports efficient proxy sniffing and offers it for free, with a simplified setup process. The PC version ensures nearly seamless setup.

  1. For the first time, Windows users should right-click and run the application as an administrator, while Mac users will need to input their password.
  2. In the device selection menu, choose either your computer or an iOS device, and select HTTPS Proxy Sniffing in the features section.
  3. Click Start to begin sniffing.
  4. On your iOS device, you’ll be prompted to install a certificate. Follow the on-screen instructions to install and trust the certificate, configure the proxy settings, and begin capturing traffic.

For setup instructions, refer to the Proxy Sniffing Tutorial.

SniffMaster Interface