Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to analyze the problem of grasping packets in APP HTTPS

2025-03-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article shows you how to analyze the APP HTTPS package grab problem, the content is concise and easy to understand, it will definitely brighten your eyes. I hope you can get something through the detailed introduction of this article.

APP HTTPS grabs the bag

When APP is HTTPS, packets cannot be crawled simply by using Burpsuite, because APP enables SSL Pinning (also known as "SSL certificate binding").

As for the principle, it will not be introduced too much.

Collected several different versions of Xposed and JustTrustMe

Xposed framework

Xposed framework is an open source framework, its function is to affect the operation of the program without modifying the APK (modify the system) of the framework services, based on it can produce many powerful modules, and in the case of functional conflict at the same time. Xposed is like the main body of the Google modular mobile phone, but the existence of a framework, until the addition of other functional modules (Modules), can not play a role, but not without it. Because of this, Xposed has a relatively high degree of customization. Moto X users can customize the appearance of the phone, wallpaper, open mobile painting, etc., while Xposed allows users to customize the function of the phone by choosing the module.

JustTrustMe

JustTrustMe is a Xposed-based module used to disable and bypass SSL certificate checking. To put it simply, JustTrustMe bypasses certificate checking by Hook all the API used to verify SSL certificates in APK

Installation process installs Xposed

1. Use Night God Simulator. Android version is Android 5.1.1.

2. After installing Xposed

3. Initialize the interface (pay attention when using Xposed, install it in the simulator as much as possible, otherwise the phone may become brick)

4. Click the OFFICIAL option

5. Click install / Update (it will be reminded again after completion, if you can confirm it all in the simulator)

6. Restart after installation (various conditions may occur after reboot, such as resolution problems, horizontal and vertical screen problems, etc., which are normal. Click any application or restart and return to normal.

7. After the installation is complete, drag JustTrustMe into the simulator to install (after dragging in, it will indicate that it is not activated, and then click to enter the Xposed interface)

8. Tick JustTrustMe

9. Then restart the simulator.

At this point, the HTTPS packet of APP can be crawled.

The above content is how to analyze the APP HTTPS packet capture problem. Have you learned the knowledge or skills? If you want to learn more skills or enrich your knowledge reserve, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report