Read the directory
1. Introduction to Fiddler packet capture
1). Field Description
2). Statistics Analysis of requested performance data
3). Inspectors to check the data content
4). AutoResponder allows the interception of rule-making requests
5).filters request filtering rules
6). Timeline Request response time
2. Fiddler sets the decryption of HTTPS network data
3. Fiddler grabs Iphone/Android packets
4. Built-in commands and breakpoints in Fiddler
prologue
Fiddler is a handy packet capture tool that can intercept, resend, edit and save packets sent and received over the Internet. It can also be used to detect network security. Anyway benefit a lot, lift of endless ah! When I was learning, I was also quite laborious. Some practical and hidden small functions were forgotten after I used them. Every time I went to the website, IT was very troublesome to find them, so I collected the information of major networks and summarized some common functions.
Fiddler download address: www.telerik.com/download/fi…
Fiddler can be downloaded offline at pan.baidu.com/s/1i3NvE8P and password is ozem
To download Fiddler you need an FQ, and I had to dig it out and download it to…
For Windows 8, Fiddler for.NET4 is better than Fiidler for.NET2
1. Introduction to Fiddler packet capture
Fiddler monitors and intercepts data by rewriting HTTP proxies to let data pass through it. Fiddler is cool, of course. The instant you open it, you’ve already set up your browser proxy. Isn’t it sweet that it restores the agent when you close it…
1) Field description
If Fiddler wants to catch packets, make sure Capture Traffic is enabled by going to File – > Capture Traffic. After this function is enabled, the packet capture function will be displayed in the lower left corner. Of course, you can directly click the icon in the lower left corner to disable/enable the packet capture function.
Fiddler is up and running, and the captured packets are displayed in a list. Here’s what it all means:
The name of the |
meaning |
# |
Fetch HTTP requests in ascending order, starting with 1 |
Result |
The HTTP status code |
Protocol |
Protocol used for the request, such as HTTP, HTTPS, or FTP |
Host |
The host name of the requested address |
URL |
Request the location of the resource |
Body |
The size of the request |
Caching |
The requested cache expiration time or cache control value |
Content-Type |
The type of the request response |
Process |
The process sending this request: process ID |
Comments |
Allows the user to add remarks to this reply |
Custom |
Allows users to set custom values |
icon |
meaning |
The request has been sent to the server |
|
The response result has been downloaded from the server |
|
The request is paused from the breakpoint |
|
The response is paused from the breakpoint |
|
The request uses the HTTP HEAD method, meaning that the response has no Body. |
|
The request uses the POST method of HTTP |
|
The request uses HTTP CONNECT method and HTTPS protocol to establish the connection tunnel |
|
The response is in HTML format |
|
The response is a picture |
|
The response is in script format |
|
The response is in CSS format |
|
The response is in XML format |
|
The response is in JSON format |
|
The response is an audio file |
|
The response is a video file |
|
The response is a SilverLight |
|
The response is a FLASH |
|
The response is a font |
|
Normal Response Succeeded |
|
The response is HTTP/300, 301, 302, 303, or 307 redirects |
|
The response is HTTP/304 (no change) : use cached files |
|
The response requires client certificate verification |
|
Server error |
|
The session is terminated by the client, Fiddler, or server |
2). Statistics Analysis of requested performance data
All right. We’re done with the left. Now we can go to the right
Click on a random request and you can see Statistics on HTTP request performance and data analysis (you can’t install Fiddler without a single request…) :
3). Inspectors to check the data content
The Inspectors are used to check the session content, the top part is for the request and the bottom part is for the response:
4). AutoResponder allows interception of requests for a specified rule
AutoResponder allows you to intercept a request for a specified rule and return a local or Fiddler resource instead of a server response.
Look at step 5 below, I bind the keyword “baidu” with the picture of my computer “F: Users\YukiO\Pictures\boy.jpeg”, click Save and check Enable Rules, then visit Baidu, it will be hijacked.
This thing has many matching rules, such as:
1. String matching (default) : Any string that contains the specified string (case insensitive) is considered a match
String matching (Baidu) match www.baidu.com matching pan.baidu.com matching tieba.baidu.com matching 2. Regular expression matching: Start with “regex:” and use the regular expression to match. This is case-sensitive
String matching (regex: +. (JPG | | GIF BMP) $) match Bbs.fishc.com/Path1/query… Don’t match Bbs.fishc.com/Path1/query… matching Bbs.fishc.com/Path1/query… matching Bbs.fishc.com/Path1/query… Don’t match
4). Composer custom request sending server
Composer allows custom requests to be sent to the server, either by manually creating a new request or by dragging and dropping an existing request from the session table
In Parsed you only need to provide a simple url address (see figure below). You can also customize some attributes in the RequestBody, such as mock browser User-agent.
5).filters request filtering rules
Fiters is used to filter requests. The window on the left is constantly updated. When you want to see a request from your system, you refresh your browser and it’s an eyesore and it keeps refreshing your screen. Filter rules are used to filter out unwanted requests.
Check the Use Filters in the upper left corner to enable the filter. There are two most commonly used filter criteria: Zone and Host
1. The Zone displays only Intranet or Internet content:
Host specifies that sessions under a domain name are displayed:
If the box is yellow (as shown in the picture), it means that the modification has not taken effect. Click the text in the red circle
6). Timeline Request response time
Click one or more (Ctrl key at the same time) in the left session window, and the Timeline displays the time when the specified content is transferred from the server to the client:
2. Fiddler sets the decryption of HTTPS network data
Fiddler can fool browsers and servers by forging CA certificates. Fiddler is a very clever device. The idea is that Fiddler masquerades as an HTTPS server in front of the browser and acts as a browser in front of the real HTTPS server, decrypting HTTPS packets.
To decrypt HTTPS manually, click:
1. Tools > Fiddler Options > HTTPS
2. Select Decrypt HTTPS Traffic
3. Click OK
3. Fiddler grabs Iphone/Android packets
Fiddler’s ability to grab data packets from a mobile device is simple. Here’s how the device accesses the network.
It can be seen that all the data packets on the mobile end need to go out through wifi, so we can turn on the hotspot of our computer, connect our mobile phone to the computer, and after Fiddler opens the agent, let the data pass Through Fiddler. Fiddler can catch these packets and send them to the router (as shown in the figure) :
1. Turn on a Wifi hotspot and connect your phone to it (I’m using 360wifi here, but any one will do)
2. Open Fidder and click [Tools] — > [Fiddler Options] on the menu bar.
3. Click [Connections], set proxy port to 8888, select Allow remote Computers to connect, and click OK
4. You can now see the IP address of your local wireless card in Fiddler (if not, restart Fiddler or find the IP address in CMD ipconfig).
5. Connect the mobile phone to THE PC’s wifi, and set the proxy IP and port (the proxy IP is the IP in the figure above, and the port is Fiddler’s proxy port 8888).
6. Access the web page, enter the proxy IP address and port number, and download Fiddler certificate. Click FiddlerRoot Certificate below
[Note] : If you open your browser and encounter an error similar to the following, please open Fiddler certificate decryption mode (Fiddler is set to decrypt HTTPS network data)
No root certificate was found. Have you enabled HTTPS traffic decryption in Fiddler yet?Copy the code
7. Once the certificate is installed, you can use your phone to access the application and see the captured packets. (Below is the data package of Burqa comics selected, and below is QQ mailbox)
4. Built-in commands and breakpoints in Fiddler
Fiddler also has a deep hidden command box. I haven’t found it after using Fiddler for several years. Occasionally, I found this small function in other people’s articles, which is quite useful.
FIddler’s breakpoint feature intercepts a request but does not send it, so you can do a lot of things like change the packet and send it back to the server. There’s a whole bunch of things you can do in Balabala, without giving examples.
The command |
Corresponding request item |
introduce |
The sample |
? |
All |
The question mark is followed by a string that matches the request containing the string |
|
> |
Body |
The greater-than sign is followed by a number that matches the size of the request |
> 1000 |
< |
Body |
The less-than sign is the opposite of the greater-than sign, matching requests that are smaller than this number |
< 100 |
= |
Result |
The equals sign is followed by a number that matches the HTTP return code |
= 200 |
@ |
Host |
@ followed by Host matches the domain name |
@www.baidu.com |
select |
Content-Type |
Select is followed by the response type and can be matched to the associated type |
select image |
cls |
All |
Clear all current requests |
cls |
dump |
All |
Package all requests into a SAZ package and save it in the “My Documents \Fiddler2\Captures” directory |
dump |
start |
All |
Start listening for requests |
start |
stop |
All |
Stop listening for requests |
stop |
Breakpoint commands | |||
bpafter |
All |
Bpafter is followed by a string that interrupts all requests containing the string |
Bpafter baidu (enter BPAfter to remove breakpoint) |
bpu |
All |
Similar to BPAfter, except that the request was received and the interrupt response was received |
Bpu baidu (enter BPU to remove breakpoint) |
bps |
Result |
It is followed by the status code, which interrupts all requests with this status code |
BPS 200 (Enter BPS to remove breakpoints) |
bpv / bpm |
HTTP method |
Interrupts only HTTP commands, such as POST and GET |
BPV get (Enter BPV to break the breakpoint) |
g / go |
All |
Allow all interrupted requests |
g |
Example demonstration:
?
>
<
=
@
select
cls
dump
Breakpoint command:
Breakpoints can be set for all requests by clicking on Fiddler’s icon in the image below. Breakpoint commands specify which requests need to be intercepted. The following is an example:
Command:
bpafter
bps
bpv
g / go