Most modern apps rely on SSL pinning to make sniffing SSL traffic through proxy more difficult. This is great security-in-depth practice, but it’s a real pain when trying to inspect app’s traffic as a part of vulnerability assessment or penetration test. Luckily there if Frida.
With increased security, it’s getting trickier to intercept HTTPs traffic send by Android Apps. For that reason most methods rely on rooting Android. But what to do when you don’t have a rooted Android on hand?
Use Android Emulator from Android Studio:
- Go to “Settings->Wireless & Networks->More”
- Go to “Cellular Network Settings”
- Go to “Access Point Names”
- Edit Proxy and Port fields
- Install root cert from BurpSuite or whatever tool you are using to intercept the traffic
- Install and run your APK