Using Frida to Bypass SSL Pinning on Android
Most modern apps rely on SSL pinning to make sniffing SSL traffic through proxy more difficult. This is great security-in-depth practice, but it's a real pain when trying to inspect app's traffic as a part of vulnerability assessment or penetration test. Luckily there if Frida.
- Run frida-server https://www.frida.re/docs/android/
- frida-ps -Uai #find the target's application identified ex: com.company.myapp
- download file bypass.js into current directory
- frida -U -f com.company.myapp -l bypass.js --no-pause
- done