About MiTM on iPhones and androids have already been relevant posts.
To the mentioned tools one more, so to speak specialized was added.
The console version of the Intercepter-NG sniffer was created and ported to unix-like
operating systems including IOS and Android.

')
For easier and more convenient control from mobile devices
Intercepter-NG Console Edition has a cross-platform GUI based on the Ncurses library, which is optimized to work with a screen size of 80x30 and above.
In the console version migrated, albeit slightly lightweight, the interception of passwords and the new resurrection mode.
From attacks available classic ARP Poison. During the search for hosts on the network, automatic
determine the gateway and operating system version (based on the TTL value).
When capturing traffic, the sniffer can save all session packets to a pcap dump and later analyze it in offline mode.
Resurrection ModeNew versions of Intercepter allow you to recover files from network traffic.
The
HTTP \ FTP \ SMB \ POP3 \ SMTP \ IMAP protocols are supported.
The main difference between Intercepter and other existing analogues is reliability and wider and full protocol support (the same Network Miner regularly drops and recovers less data).
The archive with the program contains builds for the following operating systems: Windows \ Linux \ BSD \ IOS \ Android.
IOS version tested on Iphone 3GS (3.1.2), Ipad2 (4.3.3), New Ipad (5.1.1).
Android version tested on Huawei MediaPad (3.2 and 4.0.3).
In future versions, it is planned to add interception of instant messengers and possibly introduce Raw mode, i.e.
the console version of Intercepter will become an analogue of Wireshark for mobile devices in the form in which
raw mode is present in the original Windows version.
In addition to the GUI mode, there is a usual console text view, but it is more limited in the choice of options.

The only condition for launching the console Intercepter is to have root access and
installed libpcap library.
Details on installation and use can be found in the program's readme and on the
sniff.su Wiki page
.