Network Traffic

In this post we will learn how to intercept application traffic using proxy tool

Tools

  • Burpsuite proxy tool

Setup

  • Run burpsuite

  • Configure proxy options

    • listen on port 5555 for example

    • All Interfaces

  • Install Burp Certificate as system certificate

  • Download certificate from web browser

    • http://burp

  • Configure the certificate to install it as system certificate

    • openssl x509 -inform DER -in cacert.der -out cacert.pem

    • openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1

    • mv cacert.pem <hash>.0

      • adb push9a <hash>.0 /system/etc/security/cacerts/

    • adb shell

    • chmod 644 /system/etc/security/cacerts/<hash>.0

  • Configure device proxy

    • go to settings > WI-FI

    • Keep pressing on the wifi

    • Modify Network

      • proxy hostname = Insert the ip for the machine which run burpsuite

      • proxy port = 5555

      • Save!

SSL Pinning Bypass

SSLUnpinning

SSL Unpinning is a powerful tool for SSL Pinning bypasses.

  • First we need to install Xposed Framework / Xposed APK installer

Frida

adb push burpca-cert-der.crt /data/local/tmp/cert-der.crt
frida -U -f it.app.mobile -l ssl-bypass.js --no-pause

Last updated

Was this helpful?