These two days are required to intercept network traffic of the Android APP, can read a paper on said before to delete selected by the method of tcpdump + the strace web traffic for a specific APP,
Then I run simulator, using the strace tracking system browser process result is that
B00 [40037] recvfrom (59, 0 xbecafb48, 24, 64, 0, 0)=1 EAGAIN (Try again.)
B00 [40037] recvfrom (59, 0 xbecafcc0, 24, 64, 0, 0)=1 EAGAIN (Try again.)
B00 [40037] recvfrom (59, "nysv \ 0, 0, 0, 0 ` \ 0, 0, 0001, 31, 0, 0, 0, 0, 0, 0", 24, MSG_DON
TWAIT, NULL, NULL)=24
Then I use Netstat view port
The Send Proto Recv - Q - Q Local Address Foreign Address State
TCP 0 0 127.0.0.1:5037 0.0.0.0: * LISTEN
TCP 0 0 0.0.0.0:5555 0.0.0.0: * LISTEN
TCP 0 10.0.2.15:53 5555 10.0.2.2:52278 ESTABLISHED
There is no port 59,
Finally, I use the wireshark analysis before I use tcpdump to catch down packet
. Use TCP port==59 to find, found that there is no corresponding packets,,,, inquired of god I am here is wrong,,,