Help in deciphering/filtering packets to reverse engineer mobile app

asked 2020-09-24 23:07:33 +0000

updated 2020-09-24 23:15:10 +0000

Hello everyone,

I am reaching out to you guys to ask for help on deciphering/filtering packets to reverse engineer a mobile app.

The reason why is: The gym were I go to as an app where you schedule your workout. I go there everyday at the same hour so for that reason I need to everyday repeat the same steps to schedule the workout. I want to automate this. I am trying to reverse engineer how my mobile phone contacts with the gym to make the workout reservation so that I create can create a script that makes the reservations automatically.

What I did: - I ran airodump-ng (using a wireless interface on monitor/promiscuous mode) on a PC in the same LAN of my mobile device (iPhone 7 - iOS 14.0) and whilst recording I accessed the mobile app and scheduled a workout. - I opened the .CAP file generated from the capture and filtered the packets coming from or to the address "58:40:4E:D8:73:94". To do so I used the filter: wlan.addr == 58:40:4E:D8:73:94

Now I need your expertise in helping me decipher the packets that were sent. Maybe they are encrypted and this is not possible, this is another possibility. In that case I would to ask your opinions on what approach I should use.

You can download the .pcap file here.

Thank you for reading and sorry for the long post! Cheers

edit retag flag offensive close merge delete