Help in deciphering/filtering packets to reverse engineer mobile app
Hello everyone,
I am reaching out to you guys to ask for help on deciphering/filtering packets to reverse engineer a mobile app.
The reason why is: The gym were I go to as an app where you schedule your workout. I go there everyday at the same hour so for that reason I need to everyday repeat the same steps to schedule the workout. I want to automate this. I am trying to reverse engineer how my mobile phone contacts with the gym to make the workout reservation so that I create can create a script that makes the reservations automatically.
What I did: - I ran airodump-ng (using a wireless interface on monitor/promiscuous mode) on a PC in the same LAN of my mobile device (iPhone 7 - iOS 14.0) and whilst recording I accessed the mobile app and scheduled a workout. - I opened the .CAP file generated from the capture and filtered the packets coming from or to the address "58:40:4E:D8:73:94". To do so I used the filter: wlan.addr == 58:40:4E:D8:73:94
Now I need your expertise in helping me decipher the packets that were sent. Maybe they are encrypted and this is not possible, this is another possibility. In that case I would to ask your opinions on what approach I should use.
You can download the .pcap file here.
Thank you for reading and sorry for the long post! Cheers