Using SniffMaster for HTTPS Proxy Sniffing
Proxy sniffing is a traditional method for capturing packets, which requires setting up certificates and configuring the proxy. SniffMaster simplifies this process by automatically installing the necessary certificates. You only need to follow the prompts to trust the certificate on your iOS device and configure the proxy settings as instructed. If you accidentally close the prompt, click the help button to view the setup instructions.
Entering HTTPS Proxy Sniffing Mode
- Select the iOS device you want to capture packets from in the device list.
- In the feature area, select HTTPS Proxy Sniffing. Follow the on-screen prompts to install the configuration profile and set the proxy on your iOS device. If you’re sniffing on the local machine, the configuration will be done automatically; just follow the instructions.
iOS Device Setup
- Connect the Device: Connect the iOS device to the computer via USB. Ensure the device is unlocked and the screen is on.
- Trust the Computer: If this is the first time connecting the device to this computer, the phone will ask if you trust the computer. Tap Trust.
- Install iOS Driver: On Windows, when using SniffMaster for the first time, you may be prompted to install the required drivers. Follow the on-screen prompts to complete the installation. After installation, restart SniffMaster.
- Install Configuration Profile: If the device has not been used with SniffMaster before, the software will prompt you to install a configuration profile. Follow the instructions to install it on the iOS device.
- Configure Proxy: Ensure both the phone and computer are on the same local network. On your iOS device, go to the Wi-Fi settings, select the active Wi-Fi network, scroll to the bottom, tap Configure Proxy, choose Manual, and enter the address and port provided by SniffMaster. Save the settings.
Local Machine Sniffing Setup
If you are sniffing on your local Windows machine, SniffMaster requires administrator privileges for the first run. Right-click on SniffMaster and select Run as Administrator.
For Mac users, you will need to enter your system password when running SniffMaster for the first time.
Proxy Sniffing Features
- Start: Click this button to begin packet sniffing. Click it again to stop the capture after starting.
- Save: Save the captured data in HAR format for use with other software or for continued analysis.
- Filter: Use filters to exclude unwanted data, including filtering by URL, data type, request method, and more.
- Clear: Clear all captured data records.
- Delete: Delete selected data records.
- Help: Provides operational and usage guidance. If you accidentally close the software’s prompt, you can click this button to access help information.
- Table/Group View: Switch between grouped and table views of captured records, making it easier to delete and clean up data.
- Right-click Operations: Capture records support right-click options for deleting or copying URLs.
- Sort: Capture records can be sorted by multiple criteria by clicking on the table headers.

Interceptor and Modify Request/Response
SniffMaster’s proxy sniffing supports intercepting and modifying requests and responses. You can write JavaScript code to modify headers, data, and URLs of requests and responses. Interceptor Detailed Tutorial. To open the interceptor interface, click the icon on the right side of the proxy sniffing screen, which resembles a plugin icon, and double-click the Interceptor Icon.
- Minimize: Minimize the interceptor interface to an icon.
- Maximize: Expand the interceptor interface to cover the entire software window.
- Clear: Clear the interceptor log messages.
- Interceptor Toggle: A control switch for enabling or disabling the interception code. When enabled, interception occurs; when disabled, no interception takes place.
- Edit Interceptor: Open the code editor for the interceptor logic, where you can write JavaScript code.

Interceptor Code Editor Interface

- iOS 抓包工具有哪些?开发、测试与安全场景的实战选择
- iOS 抓包软件哪款更适合团队?工具职责、实战流程与替代方案解析
- iOS 设备如何抓包,从入门到工程化排查的可执行指南(抓包、HTTPS抓包、Charles、tcpdump、Wireshark)
- iOS 手机端抓包工具选型与实战攻略
- iOS 手机抓包 App 怎么选与实战流程(抓包、HTTPS抓包、Charles、tcpdump、Wireshark)
- App HTTPS 抓包 工程化排查与工具组合实战
- iPhone HTTPS 抓包,从无法抓包到定位问题的流程(Charles/tcpdump/Wireshark/Sniffmaster)
- HTTPS 请求抓包,从原理到落地排查的工程化指南(Charles / tcpdump / Wireshark / Sniffmaster)
- iOS HTTPS 抓包,从原理到落地排查的工程化方法(Charles / tcpdump / Sniffmaster)
- iOS 抓不到包怎么办?工程化排查与替代抓包方案(抓包/HTTPS/Charles代理/tcpdump)
- Fiddler 抓不到包怎么办?从排查到替代方案的工程实战
- Charles 抓不到包怎么办?一线工程师的排查与真机抓包流程
- iOS 设备 抓包,iOS实机抓包到问题闭环的工程化实战
- 网站抓包,工程化抓取、分析与真机取证实战
- 如何排查“链接 HTTPS”问题,工程化思路与iOS抓包流程
- iOS 抓包工具怎么选?开发者的实战经验与选择指南
- iOS 抓包工具有哪些?全面盘点主流工具与功能对比分析
- 开始使用
- Interceptor Guide
- Capture iOS TCP Packets
- Crack HTTPS Sniffing
- Start
- 嗅探大师android版
- 嗅探大师拦截器详细教程
- 嗅探大师常见问题
- 代理抓包
- 数据流抓包
- HTTPS暴力抓包