Bypass SSL Pinning in Android Phones — Part 2 | by Shikhar Gupta | Jan, 2023

Bypass SSL Pinning in Android Phones — Part 2 | by Shikhar Gupta | Jan, 2023

1. Rooted Device or Emulator

2. Android Debug Bridge(ADB) Platform-Tools

3. Frida Packages

$ pip3 install Frida 
$ pip3 install frida-tools

4. Scripts for injection

5. Proxy Tools (Burp Suite)

Now Let’s Bypass SSL Pinning!!!

Debugging mode On
adb devices
devices detected
adb connect <DeviceIP:Port>
adb connect 192.168.1.102:5555
adb is already connected to the mobile emulator
adb shell getprop ro.product.cpu.abi
android architecture version
adb push <path_of_frida_server_folder> /data/local/tmp 
adb push "/home/rapso/Desktop/tools/mobtest/frida-server-x86" /data/local/tmp
adb shell chmod 777 /data/local/tmp/frida-server-x86
giving full permission to frida server
adb shell /data/local/tmp/frida-server-x86 &
Running the frida server
Frida-ps -Uai
SSLBypass script uploaded to tmp dir
Burp’s certificate uploaded
frida -U -f <application_package_name> -l <path_to_sslbypass.js_script> 
frida -U -f app.mycountrydelight.in.countrydelight -l "sslbypass.js"
HTTP request intercepted in the Burp

References

administrator

Leave a Reply

Your email address will not be published. Required fields are marked *

fb logo
recover dogecoin from a scam
recover ethereum from a scammer
hire a hacker to hack iphone
hire a hacker to hack snapchat
hire a hacker to hack a windows computer
error: Content is protected !!