Start Using SniffMaster for Packet Sniffing
SniffMaster currently supports proxy-based packet sniffing on both Mac and Windows, and offers full traffic sniffing, HTTPS brute-force sniffing, and HTTPS proxy sniffing for iOS devices.
Download and Installation
- Visit the official SniffMaster download page.
- Select the appropriate version: Windows for Windows users, or macOS for Mac users. SniffMaster is a portable software, so once downloaded and extracted, it is ready to use.
- When launching SniffMaster for the first time on Windows, you may be prompted to install or update the WebView2 runtime. Click Yes to proceed, and once the installation is complete, you can start using SniffMaster.
- Upon first launch, you might also be asked to install the iOS driver. Click OK and follow the on-screen instructions to install the iOS driver.
Registration and Login
SniffMaster’s basic features can be used without registration or login. Advanced features require login and registration.
- To log in, click the user login button in the top-right corner of the software, and enter your email and password.
- If you don’t have an account, click Register, and a verification email will be sent. Click the verification link in the email, then return to SniffMaster to log in.
Brute-force HTTPS Sniffing for iOS
Brute-force HTTPS sniffing allows you to capture HTTPS requests from iOS devices without setting up a proxy, and automatically decrypts HTTPS traffic. The app being captured must be signed with an iOS developer certificate. For unsigned apps (e.g., iOS system apps or certain third-party apps), only the request URL and headers will be visible; the body of the request and response will not be captured. PIN code checks and mutual certificate verification will not block or detect the use of brute-force sniffing.
To start:
- Connect your iOS device to your computer via USB.
- Select the device in SniffMaster and choose HTTPS Brute-force Sniffing from the features menu.
- Click Start. If you want to capture data from a specific app, click Select App to filter.
For detailed instructions, refer to the Brute-force Sniffing Tutorial.
Capturing iOS Data Traffic
iOS data traffic includes all network requests made by the device, such as HTTPS, socket communication, TCP, UDP, and DNS protocol packets.
To capture iOS data traffic:
- Connect your iOS device via USB and select it in SniffMaster.
- Choose Data Traffic Sniffing from the features menu and click Start.
- To capture data from a specific app, click Select App to filter.
For more details, see the Data Traffic Sniffing Tutorial.
Proxy-Based HTTPS Data Sniffing
Proxy sniffing is the traditional method for capturing packets and works well for most HTTPS requests. However, it cannot capture requests that involve certificate validation. This method requires installing and trusting a certificate on the device, and configuring a proxy, making it slightly more complex.
SniffMaster supports efficient proxy sniffing and offers it for free, with a simplified setup process. The PC version ensures nearly seamless setup.
- For the first time, Windows users should right-click and run the application as an administrator, while Mac users will need to input their password.
- In the device selection menu, choose either your computer or an iOS device, and select HTTPS Proxy Sniffing in the features section.
- Click Start to begin sniffing.
- On your iOS device, you’ll be prompted to install a certificate. Follow the on-screen instructions to install and trust the certificate, configure the proxy settings, and begin capturing traffic.
For setup instructions, refer to the Proxy Sniffing Tutorial.

- iOS 抓包工具有哪些?开发、测试与安全场景的实战选择
- iOS 抓包软件哪款更适合团队?工具职责、实战流程与替代方案解析
- iOS 设备如何抓包,从入门到工程化排查的可执行指南(抓包、HTTPS抓包、Charles、tcpdump、Wireshark)
- iOS 手机端抓包工具选型与实战攻略
- iOS 手机抓包 App 怎么选与实战流程(抓包、HTTPS抓包、Charles、tcpdump、Wireshark)
- App HTTPS 抓包 工程化排查与工具组合实战
- iPhone HTTPS 抓包,从无法抓包到定位问题的流程(Charles/tcpdump/Wireshark/Sniffmaster)
- HTTPS 请求抓包,从原理到落地排查的工程化指南(Charles / tcpdump / Wireshark / Sniffmaster)
- iOS HTTPS 抓包,从原理到落地排查的工程化方法(Charles / tcpdump / Sniffmaster)
- iOS 抓不到包怎么办?工程化排查与替代抓包方案(抓包/HTTPS/Charles代理/tcpdump)
- Fiddler 抓不到包怎么办?从排查到替代方案的工程实战
- Charles 抓不到包怎么办?一线工程师的排查与真机抓包流程
- iOS 设备 抓包,iOS实机抓包到问题闭环的工程化实战
- 网站抓包,工程化抓取、分析与真机取证实战
- 如何排查“链接 HTTPS”问题,工程化思路与iOS抓包流程
- iOS 抓包工具怎么选?开发者的实战经验与选择指南
- iOS 抓包工具有哪些?全面盘点主流工具与功能对比分析
- 开始使用
- Interceptor Guide
- proxy sniff https
- Capture iOS TCP Packets
- Crack HTTPS Sniffing
- 嗅探大师android版
- 嗅探大师拦截器详细教程
- 嗅探大师常见问题
- 代理抓包
- 数据流抓包
- HTTPS暴力抓包