Why don’t Reqable and other phone sniffers display file download traffic?
When using Reqable and other network sniffers on a mobile device, I don’t see information about file downloads in the logs. For example, when downloading a file from the internet, it doesn’t appear in the logs, while other actions such as browsing web pages or entering search queries are successfully recorded. How can I configure or fix Reqable to properly track and display file download traffic?
Reqable and Other Sniffers Often Don’t Display File Download Traffic Due to HTTPS Connection Features and SSL Encryption
Files are typically downloaded over secure connections that require proper installation and trust of sniffer certificates, as well as correct proxy configuration.
Table of Contents
- Main Reasons for Missing File Download Traffic
- Setting Up SSL Certificates in Reqable
- Certificate Verification and Trust
- Special Rules for SSL Decoding
- Troubleshooting with Specific Applications
- Alternative Methods for Tracking Downloads
Main Reasons for Missing File Download Traffic
The absence of file download information in sniffer logs is usually related to several key reasons:
HTTPS Encryption. Most modern applications use HTTPS for file downloads, which requires special handling of SSL certificates. Without proper installation of the sniffer’s certificate, the traffic remains encrypted and unreadable.
SSL Pinning. Many applications use SSL pinning mechanisms that “pin” trust to specific certificates and reject connections through proxy servers, even if the certificate is installed.
Proxy Configuration. Incorrect proxy settings on the mobile device can cause applications to simply ignore the proxy server for certain types of traffic, especially for downloading large files.
Traffic Filtering. Some sniffers by default filter or don’t display certain types of requests, such as binary data or file transfer streams.
Setting Up SSL Certificates in Reqable
For Reqable to properly track file download traffic, SSL certificates must be configured correctly:
Step 1: Download the certificate
- Open the Reqable application on your mobile device
- Go to Settings → Downloaded Profile
- Select Reqable CA and download the certificate file
Step 2: Install the certificate
- On the device, open Settings → Security → Trusted credentials
- Find and install the downloaded Reqable CA certificate
- Confirm installation if required
Step 3: Configure the proxy
- In Reqable settings, specify the IP address and proxy port
- On the mobile device, in Wi-Fi or mobile network settings, specify the proxy server
- Ensure that the proxy is configured for all applications or only for the required ones
Important: For Android versions 10 and above, additional configuration to trust the certificate may be required in Settings → General → About phone → Certificate trust settings.
Certificate Verification and Trust
After installing the certificate, you need to ensure that the system trusts it:
Installation Verification
- Open Settings → Security → Trusted credentials
- Ensure that the Reqable CA certificate is present and marked as installed
- Verify that the certificate is in the User certificates section (not system certificates)
Additional Trust Settings
- For some Android devices, an additional step is required:
- Settings → General → About phone → Certificate trust settings
- Enable the toggle for the Reqable CA certificate
Functionality Testing
- Open a browser and navigate to any HTTPS website
- Ensure that Reqable intercepts the traffic
- If traffic is intercepted but files are not displayed, the issue may be in the filtering settings
Special Rules for SSL Decoding
Reqable allows configuring special rules for processing SSL traffic:
SSL Decoding Rule Configuration
- In Reqable, open the SSL section
- Add rules for specific domains that should be decoded
- For domains where decoding is not required, add rules to bypass SSL decoding
Example Rules:
- For
example.comenable SSL decoding - For
secure-api.example.comdisable SSL decoding (if the application uses SSL pinning)
Request Type Filtering
- In Reqable settings, configure filtering to display binary data
- Ensure that all traffic is captured, not just HTTP requests
- Check packet size and data type filtering settings
Troubleshooting with Specific Applications
Some applications have special mechanisms to protect against traffic interception:
Applications with SSL Pinning
- For applications with strict SSL pinning, you may need:
- Using specialized tools (e.g., Frida for bypassing SSL pinning)
- Manual modification of the APK file to trust user certificates
- Using VirtualXposed for automatic modification of installed APKs
System Applications
- For system applications, you may need:
- Obtaining root access
- Moving the certificate to the system section using tools like MoveCerts
- Using emulators with pre-installed certificates
Hybrid Applications (WebView)
- If the download occurs through a WebView component:
- Ensure that WebView uses system proxy settings
- Check WebView security settings
- Try disabling WebView security in developer settings
Alternative Methods for Tracking Downloads
If standard settings don’t work, you can use alternative approaches:
Using Other Sniffers
- Try alternative tools:
- Charles Proxy - requires installing its own certificate and configuring the proxy
- Burp Suite - professional tool for web testing
- HTTP Catcher - simplified alternative with good mobile device support
File System Monitoring
- Monitor changes in download folders:
- Android:
/storage/emulated/0/Download - iOS:
~/Documents
- Android:
- Use file monitors to track the creation of new files
Network Analyzers
- Use tools for analyzing network traffic:
- Wireshark - packet capture at the OS level
- NetworkMiner - file extraction from captured traffic
- Configure capture of all network traffic without filtering
Sources
- Reqable SSL Documentation - Configure SSL decryption rules
- Reqable Certificate Installation Guide
- Flutter app traffic capture with Reqable
- Android emulator traffic analysis with Reqable
- SSL traffic decryption requirements
- Traffic sniffers overview on Habr
- Mobile app traffic capture guide
Conclusion
Key Takeaways:
- The main issue with Reqable is the lack of proper SSL certificate configuration for HTTPS traffic
- Files are typically downloaded over secure connections, which requires installation and trust of the sniffer’s certificate
- Many applications use SSL pinning, which prevents traffic interception through proxies
- For complex cases, additional SSL decoding rule configurations may be required
Practical Recommendations:
- Always first install and configure the Reqable SSL certificate
- Verify certificate trust in device security settings
- For complex cases, use a combination of tools or alternative monitoring methods
- Regularly update Reqable to the latest version to support new application protection mechanisms
For in-depth study of sniffer configuration, it is recommended to refer to the official documentation of the selected tool and specialized resources on mobile testing.