Skip to content

Crash on Samsung Galaxy S23 (Android 14) when running ecapture tls (v1.4.1) #830

@p3n7a90n

Description

@p3n7a90n

Desc
Mobile is crashing when running the ecapture. I have tried mentioning the ssl_version as well by using --ssl_version=boringssl_a_14

Steps to reproduce the behavior:

dm1q:/data/local/tmp/ecapture-v1.4.1-android-arm64 # ./ecapture tls
2025-09-02T07:24:48Z INF AppName="eCapture(旁观者)"
2025-09-02T07:24:48Z INF HomePage=https://ecapture.cc
2025-09-02T07:24:48Z INF Repository=https://github.com/gojue/ecapture
2025-09-02T07:24:48Z INF Author="CFC4N [email protected]"
2025-09-02T07:24:48Z INF Description="Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64."
2025-09-02T07:24:48Z INF Version=androidgki_arm64:v1.4.1:6.8.0-1031-azure
2025-09-02T07:24:48Z INF Listen=localhost:28256
2025-09-02T07:24:48Z INF Listen for eCaptureQ=
2025-09-02T07:24:48Z INF eCapture running logs logger=
2025-09-02T07:24:48Z INF the file handler that receives the captured event eventCollector=
2025-09-02T07:24:48Z INF listen=localhost:28256
2025-09-02T07:24:48Z INF https server starting...You can upgrade the configuration file via the HTTP interface.
2025-09-02T07:24:48Z INF Kernel Info=5.15.123 Pid=7985
2025-09-02T07:24:48Z INF TruncateSize=0 Unit=bytes
2025-09-02T07:24:48Z WRN Your environment is like a container. We won't be able to detect the BTF configuration.
If eCapture fails to run, try specifying the BTF mode. use -b 2 to specify non-CORE mode.
2025-09-02T07:24:48Z INF BTF bytecode mode: CORE. btfMode=0
2025-09-02T07:24:48Z INF master key keylogger has been set. eBPFProgramType=Text keylogger=
2025-09-02T07:24:48Z INF module initialization. isReload=false moduleName=EBPFProbeOPENSSL
2025-09-02T07:24:48Z INF Module.Run()
2025-09-02T07:24:48Z WRN bpfFile=boringssl_a_14_kern.o sslVersion=android_default
2025-09-02T07:24:48Z INF Hook masterKey function ElfType=2 Functions=["SSL_in_init"] binrayPath=/apex/com.android.conscrypt/lib64/libssl.so
2025-09-02T07:24:48Z INF target all process.
2025-09-02T07:24:48Z INF target all users.
2025-09-02T07:24:48Z INF setupManagers eBPFProgramType=Text
2025-09-02T07:24:48Z INF BPF bytecode file is matched. bpfFileName=user/bytecode/boringssl_a_14_kern_core.o

  • Device: Samsung Galaxy S23
  • Kernel Info: dm1q:/ # uname -a Linux localhost 5.15.123-android13-8-28577312-abS911BXXS4CXD8 #1 SMP PREEMPT Fri Apr 26 09:41:16 UTC 2024 aarch64 Toybox

Metadata

Metadata

Assignees

No one assigned

    Labels

    🐞 bugSomething isn't working

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions