Intercepting Android App Traffic
π Resources π
Bypass certificate pinning with Frida
I've used my KaliVM and this instructions to follow IppSec's video and get everything working as he described.
π Intercepting Android App Traffic with BurpSuite - by IppSec
Video Timeline
00:00 - Introduction, talking about RouterSpace and why we can't just do what we did in that video 01:25 - Installing Genymotion, Virtual Box, and ADB; while talking about why I don't use Android Studio/AVD. Simply because genymotion just works. 02:05 - Make sure you upgrade your memory, processors, and enable Virtualization in your VM Settings! 02:30 - Running Genymotion and starting a Pixel 3 XL 03:37 - Converting BurpSuites Certificate to PEM Format with openssl x509 -inform der -in [name of cert] -out burp.pem 04:20 - Renaming the certificate to 9a5ba575.0, and showing how we got that name 06:00 - Starting the device and showing the certificate authorities 07:00 - Copying the certificate to /system/etc/security/cacerts/, and showing how to remount to rw 08:10 - Showing how to set the proxy through both the GUI and via ADB 09:50 - Installing GAPPS 10:30 - Showing how to unset the proxy from ADB 11:00 - Creating an alias to set and unset the proxy via adb 12:00 - Opening the google play store and logging in and install Wayzn to see if we can intercept traffic 15:20 - Showing we intercepted traffic from Wayzn, then installing Instagram 16:50 - Attempting to login to instagram and getting an error message 17:20 - Setting up Frida both on our computer and android device 19:20 - Showing Frida is working, getting ps output from the android device 19:55 - Downloading the instragram ssl pinning bypass script 21:20 - Using frida to start instagram and loading the script to bypass the SSL Checking 22:15 - Setting the proxy and showing us intercept instagram traffic
Open Genymotion Settings and setup Hypervisor to Virtualbox
Install a new Google Pixel 3 XL device
Run Burpsuite and copy its certificate
Copy cert to device

To start capturing traffic with BurpSuite, set the proxy listener to
All interfaces

Set the proxy usage on the device, with the KaliVM IP
From Genymotion, click OpenGAPPS to install Gapps on the device and restart the device.
Run Play Store on the device and install apps
e.g.- Wayzn, Instagram - in this case
Try to set the proxy, turn BurpSuite intercept on and login into the Wayzn app

Open Instagram and try to login.
Unable to log inwith proxy set.

Unsetting the proxy, Instagram error changes.
Instagram prevents from intercepting the traffic

Install Frida
π Follow Frida Android
Check Frida is working
Download the Instagram SSL Pinning Bypass script 22:15 - Setting the proxy and showing us intercept instagram traffic
Force stop Instagram app from App info
Use Frida to start Instagram and load the script to bypass the SSL Checking

Show Instagram intercepted traffic in BurpSuite

Last updated
Was this helpful?