Intercepting Among Us traffic

So if you haven't heard of the recently popular game Among Us, it's a pretty simple game involving a group of crew members on a ship with a few unknown murderous "imposters" on board.

Let's jump right into it - intercepting traffic was easy and my quick observation showed conversation data happens over plain text.

First thing is first: intercepting your phone's traffic:

There are many methods on how to intercept your phone's WiFi, but I wanted results quickly and decided to take a packet capture using my router's built in feature.

After opening the capture in Wireshark, I first checked the conversations:

Menu Bar > Statistics > Conversations

I knew this was the Among Us server because I first started off a live tcpdump session on my router's command line and saw traffic to this particular server light up as soon as I'd start a match. Here's another example of what it looked like:

20:25:25.451704 IP li1108-200.members.linode.com.22023 > 10.1.1.95.49769: UDP, length 23
# host li1108-200.members.linode.com
li1108-200.members.linode.com has address 45.79.9.200
They seem to use a bunch of Linode servers - same naming scheme though

Back to Wireshark. Click on the conversation and click the "Follow Stream" button at the bottom of the window:

Then you'll get a full UDP stream of the conversation during the waiting room and match including a list of player names:

null was my name for this match, hehe. Red indicated client packets (my phone)

Scroll down a little further... and there's the conversation!

My goal is to inject packets, or learn how to decode the other UDP packets to cheat and find out who an impostor is. Let's see if I can get that far.