Intercepting Android App Traffic


🌐 Resources πŸ”—


Bypass certificate pinning with Frida

I've used my KaliVM and this instructions to follow IppSec's video and get everything working as he described.

πŸ”— Intercepting Android App Traffic with BurpSuite - by IppSec

Video Timeline

00:00 - Introduction, talking about RouterSpace and why we can't just do what we did in that video
01:25 - Installing Genymotion, Virtual Box, and ADB; while talking about why I don't use Android Studio/AVD. Simply because genymotion just works.
02:05 - Make sure you upgrade your memory, processors, and enable Virtualization in your VM Settings!
02:30 - Running Genymotion and starting a Pixel 3 XL
03:37 - Converting BurpSuites Certificate to PEM Format with openssl x509 -inform der -in [name of cert] -out burp.pem
04:20 - Renaming the certificate to 9a5ba575.0, and showing how we got that name
06:00 - Starting the device and showing the certificate authorities
07:00 - Copying the certificate to /system/etc/security/cacerts/, and showing how to remount to rw
08:10 - Showing how to set the proxy through both the GUI and via ADB
09:50 - Installing GAPPS
10:30 - Showing how to unset the proxy from ADB
11:00 - Creating an alias to set and unset the proxy via adb
12:00 - Opening the google play store and logging in and install Wayzn to see if we can intercept traffic
15:20 - Showing we intercepted traffic from Wayzn, then installing Instagram
16:50 - Attempting to login to instagram and getting an error message
17:20 - Setting up Frida both on our computer and android device
19:20 - Showing Frida is working, getting ps output from the android device
19:55 - Downloading the instragram ssl pinning bypass script
21:20 - Using frida to start instagram and loading the script to bypass the SSL Checking
22:15 - Setting the proxy and showing us intercept instagram traffic
  • Open Genymotion Settings and setup Hypervisor to Virtualbox

  • Install a new Google Pixel 3 XL device

  • Run Burpsuite and copy its certificate

  • Copy cert to device

  • To start capturing traffic with BurpSuite, set the proxy listener to All interfaces

  • Set the proxy usage on the device, with the KaliVM IP

  • From Genymotion, click OpenGAPPS to install Gapps on the device and restart the device.

  • Run Play Store on the device and install apps

    • e.g. - Wayzn, Instagram - in this case

  • Try to set the proxy, turn BurpSuite intercept on and login into the Wayzn app

  • Open Instagram and try to login. Unable to log in with proxy set.

  • Unsetting the proxy, Instagram error changes.

    • Instagram prevents from intercepting the traffic

  • Check Frida is working

  • Force stop Instagram app from App info

  • Use Frida to start Instagram and load the script to bypass the SSL Checking

  • Show Instagram intercepted traffic in BurpSuite


Last updated

Was this helpful?