You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: mobile-pentesting/android-app-pentesting/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -454,7 +454,7 @@ It's recommended to **apply SSL Pinning** for the sites where sensitive informat
454
454
### Inspecting HTTP traffic
455
455
456
456
First of all, you should (must) **install the certificate** of the **proxy** tool that you are going to use, probably Burp. If you don't install the CA certificate of the proxy tool, you probably aren't going to see the encrypted traffic in the proxy.\
457
-
**Please,**[**read this guide to learn how to do install a custom CA certificate**](android-burp-suite-settings.md)**.**
457
+
**Please,**[**read this guide to learn how to do install a custom CA certificate**](avd-android-virtual-device.md#install-burp-certificate-on-a-virtual-machine)**.**
458
458
459
459
For applications targeting **API Level 24+ it isn't enough to install the Burp CA** certificate in the device. To bypass this new protection you need to modify the Network Security Config file. So, you could modify this file to authorise your CA certificate or you can [**read this page for a tutorial on how to force the application to accept again all the installed certificate sin the device**](make-apk-accept-ca-certificate.md).
Copy file name to clipboardExpand all lines: mobile-pentesting/android-app-pentesting/avd-android-virtual-device.md
+5-51
Original file line number
Diff line number
Diff line change
@@ -230,59 +230,13 @@ adbd cannot run as root in production builds
230
230
231
231
Using [rootAVD](https://github.com/newbit1/rootAVD) with [Magisk](https://github.com/topjohnwu/Magisk) I was able to root it (follow for example [**this video**](https://www.youtube.com/watch?v=Wk0ixxmkzAI)**or**[**this one**](https://www.youtube.com/watch?v=qQicUW0svB8)).
232
232
233
-
## Install Burp certificate on a Virtual Machine
233
+
## Install Burp Certificate
234
234
235
-
First of all you need to download the Der certificate from Burp. You can do this in _**Proxy**_ --> _**Options**_ --> _**Import / Export CA certificate**_
235
+
Check the following page to learn how to install a custom CA cert:
236
236
237
-
.png>)
238
-
239
-
**Export the certificate in Der format** and lets **transform** it to a form that **Android** is going to be able to **understand.** Note that **in order to configure the burp certificate on the Android machine in AVD** you need to **run** this machine **with** the **`-writable-system`** option.\
Once the **machine finish rebooting** the burp certificate will be in use by it!
264
-
265
-
## Install Burp Certificate with Magisc
266
-
267
-
If you **rooted your device with Magisc** (maybe an emulator), and you **can't follow** the previous **steps** to install the Burp cert because the **filesystem is read-only** and you cannot remount it writable, there is another way.
268
-
269
-
Explained in [**this video**](https://www.youtube.com/watch?v=qQicUW0svB8) you need to:
270
-
271
-
1.**Install a CA certificate**: Just **drag\&drop** the DER Burp certificate **changing the extension** to `.crt` in the mobile so it's stored in the Downloads folder and go to `Install a certificate` -> `CA certificate`
2.**Make it System trusted**: Download the Magisc module [MagiskTrustUserCerts](https://github.com/NVISOsecurity/MagiskTrustUserCerts) (a .zip file), **drag\&drop it** in the phone, go to the **Magics app** in the phone to the **`Modules`** section, click on **`Install from storage`**, select the `.zip` module and once installed **reboot** the phone:
0 commit comments