跟踪显示的 Admob URL

发布于 2024-12-26 16:28:21 字数 231 浏览 1 评论 0原文

我正在尝试被动记录应用程序中显示的所有广告横幅。我可以不用管手机,运行一个程序来抓取所有屏幕截图。然而,URL 数据很少出现在横幅本身中。

我需要能够跟踪所有流量并将 URL(希望带有时间戳)与广告横幅(我已经有时间戳)进行匹配。

我在调试模式下使用过 Eclipse、Netwitnes 和 Wireshark。在所有这些流量中,我无法跟踪广告横幅中显示的 URL。

关于如何跟踪这个有什么想法吗?

I am trying to passively record all ad banners displayed in an app. I am able to leave my phone alone and have a program to run to grab all the screen shots. However the URL data is rarely presented in the banner itself.

I need to be able to track all traffic and match the URL (hopefully with a timestamp) to the ad banner (to which I already have a timestamp).

I have used Eclipse in debug mode, Netwitnes and Wireshark. In all of that traffic I have been unable to track a URL displayed in an ad banner.

Any ideas on how to track this?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

靖瑶 2025-01-02 16:28:21

Bro 使从网络跟踪中提取 URL 变得非常容易:

bro -r trace.pcap
bro-cut ts host uri < http.log | awk '{ print $1, $2 $3 }'

小工具 bro-cut< /code> 随 Bro 一起提供,并从日志中提取相关(类型化)列。在本例中,您需要时间戳 (ts) 加上 URL 组件(hosturi)。一些示例输出:

1258535653.087137 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535655.525107 www.update.microsoft.com/v9/windowsupdate/selfupdate/wuident.cab?0911180916
1258535656.495997 download.windowsupdate.com/v9/windowsupdate/a/selfupdate/WSUS3/x86/Other/wsus3setup.cab?0911180916
1258535656.548965 download.windowsupdate.com/v9/windowsupdate/a/selfupdate/WSUS3/x86/Other/wsus3setup.cab?0911180916
1258535658.736840 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535666.171669 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535698.141338 212.227.97.133/rpc.html?e=bl
1258535656.548965 download.windowsupdate.com/v9/windowsupdate/a/selfupdate/WSUS3/x86/Other/wsus3setup.cab?0911180916
1258535658.736840 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535666.171669 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535698.141338 212.227.97.133/rpc.html?e=bl
1258535699.032780 87.106.1.47/rpc.html?e=bl
1258535699.931215 87.106.1.89/rpc.html?e=bl

剩下的就是过滤掉 Admob URL,您可能最了解如何执行此操作。

Bro makes it really easy to extract URLs from a network trace:

bro -r trace.pcap
bro-cut ts host uri < http.log | awk '{ print $1, $2 $3 }'

The small tool bro-cut ships with Bro and extracts the relevant (typed) columns from the log. In this case, you want the timestamp (ts) plus the URL components (host and uri). Some example output:

1258535653.087137 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535655.525107 www.update.microsoft.com/v9/windowsupdate/selfupdate/wuident.cab?0911180916
1258535656.495997 download.windowsupdate.com/v9/windowsupdate/a/selfupdate/WSUS3/x86/Other/wsus3setup.cab?0911180916
1258535656.548965 download.windowsupdate.com/v9/windowsupdate/a/selfupdate/WSUS3/x86/Other/wsus3setup.cab?0911180916
1258535658.736840 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535666.171669 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535698.141338 212.227.97.133/rpc.html?e=bl
1258535656.548965 download.windowsupdate.com/v9/windowsupdate/a/selfupdate/WSUS3/x86/Other/wsus3setup.cab?0911180916
1258535658.736840 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535666.171669 download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?0911180916
1258535698.141338 212.227.97.133/rpc.html?e=bl
1258535699.032780 87.106.1.47/rpc.html?e=bl
1258535699.931215 87.106.1.89/rpc.html?e=bl

What remains is filtering out the Admob URLs, which you probably know best how to do.

紧拥背影 2025-01-02 16:28:21

我得出了两种解决方案。一种是已实施,一种是正在进行的工作。

第一个利用 BlueStacks、DDMS (Logcat) 和 AutoHotkey。我使用运行广告的应用程序设置了 bluestack 模拟器。我用 AutoHotkey 录制了一个宏并让它运行。当我想监控它时,我会通过 DDMS 查看 logcat 日志,以找到我想要的广告的网址。这是一种迂回的方式,但它确实有效。理想情况下,我想编写一个 MonkeyRunner 脚本来完成所有这一切。我知道这些功能的存在,但事实证明,实际安装和设置该工具很困难。

I've arrived at two solutions. One is implemented one is a Work In Progress.

The first utilizes BlueStacks, DDMS (Logcat) and AutoHotkey. I set up the bluestack emulator with an app running ads. I recorded a macro with AutoHotkey and let it run. When I want to monitor it I will take a look at the logcat log via DDMS to find the urls for the ads I want. It's sort of a round about way but it works. Idealing I would like to write a MonkeyRunner script to do all of this. I know the capabilities exists but actually installing and setting up that tool has proven difficult.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文