Man In The Middle Android APK Network Traffic

Поділитися
Вставка
  • Опубліковано 9 лис 2024

КОМЕНТАРІ • 40

  • @kimworks8319
    @kimworks8319 3 роки тому +5

    Please keep on making reverse engineering APK videos! They are helpful.

  • @giladreich810
    @giladreich810 4 роки тому +3

    Very useful video! Thanks for sharing your knowledge.

    • @RingZeroLabs
      @RingZeroLabs  4 роки тому

      Glad it was helpful. Thank you for watching :)

  • @darkp0int
    @darkp0int 3 роки тому +1

    Tutorial apk-mitm for android 7+ please, because since 2016 this not gonna works for Android API 24+
    thanks for your great videos, mate

    • @adib8253
      @adib8253 2 роки тому

      Hi I am agree with you, but after rewatch again, in this video he is using API-29 in minute 3:49 , which mean he used android 10 ( API level 29 ). How possible to install custom certificate under user space? So my answer is, may be the emulator is rooted before. I'm not yet try it.

  • @tonybloodloss
    @tonybloodloss 2 роки тому

    I absolutely subscribed

    • @RingZeroLabs
      @RingZeroLabs  2 роки тому +1

      Glad it was helpful. Happy hunting :)

  • @aliksz
    @aliksz 3 роки тому +2

    Hi Thanks for your video! I receive the message ''Running Firefox as root in a regular user's session is not supported'' when running your script. Do you know a way to fix this?

    • @RingZeroLabs
      @RingZeroLabs  3 роки тому

      Hey. The script was developed and run on Kali linux which runs by default as an elevated user. The error you're encountering may be due to being run from a regular account. I found some things online that point to "sudo chmod u+s /usr/bin/firefox" being a possible fix, but I wouldn't mess around with modifying the permissions on binaries affecting regular user accounts. Not sure if this helps.

    • @aliksz
      @aliksz 3 роки тому

      @@RingZeroLabs thanks for your quick response. I will try the command

  • @mahmoud_etc
    @mahmoud_etc 2 роки тому

    Thank you for your video. It works for all google app except Linkedin app. I think Linkedin app forces TLS v3 and mitmproxy cannot tamper request. Have you any advice?

    • @RingZeroLabs
      @RingZeroLabs  2 роки тому +1

      They may be doing certificate pinning in which case you'll need to bypass that with something like Frida. You can find many articles about how to do that by searching "APK certificate pinning bypass". Happy hunting.

  • @senolatac451
    @senolatac451 3 роки тому +1

    Hi @RingZeroLabs, Can I implement it with VirtualBox?
    I've tried to use it on virtualbox (linux kani) but android emulator didn't work. Vt-x or SVM error...

    • @RingZeroLabs
      @RingZeroLabs  3 роки тому

      You probably need to enable "nested VT-X" in virtualbox. That would be my guess.

    • @senolatac451
      @senolatac451 3 роки тому

      @@RingZeroLabs Thanks it works but I got another error like: stackoverflow.com/questions/66704759/virtual-box-critical-error-while-running-the-android-emulator

    • @RingZeroLabs
      @RingZeroLabs  3 роки тому

      @@senolatac451 Hmm after a quick search it seems that android emulator inside vm's using virtualbox has historically had a lot of issues. It seems most of the recommendations are to either use VMWare, Hypver-V, or just install the emulator natively on your base machine. Not a great answer but it's what I found :(

    • @senolatac451
      @senolatac451 3 роки тому

      @@RingZeroLabs thank you very much. VMWare fusion solved my problem.

    • @RingZeroLabs
      @RingZeroLabs  3 роки тому

      @@senolatac451 Hey that's awesome. Glad it worked out.

  • @_netbot
    @_netbot 3 роки тому +1

    I like your videos.. please make more.

    • @RingZeroLabs
      @RingZeroLabs  3 роки тому

      Thank you :) Hard to find time lately to make videos, but as soon as things settle down I'll be sure to upload some more :)

  • @aaaaaa8711
    @aaaaaa8711 4 роки тому +4

    ssl pinning?

    • @RingZeroLabs
      @RingZeroLabs  4 роки тому +1

      SSL pinning is when you know what host you’re connecting to. You know what the certificate will be, so you program your app to reject all certificates but the one for the host you specify.

    • @aaaaaa8711
      @aaaaaa8711 4 роки тому

      @@RingZeroLabs do you have any idea how to view it's traffic I have tried it 1-2 year back ( with Frida) but not succeeded . May be any article you came across?
      PS: Great video!

    • @RingZeroLabs
      @RingZeroLabs  4 роки тому +1

      @@aaaaaa8711 There is a great article here detailing 4 ways to bypass SSL certificate security blog.netspi.com/four-ways-bypass-android-ssl-verification-certificate-pinning/ . Specifically they point out using this tool github.com/sensepost/objection for automating the process of installing frida hooks in APKs.

    • @darkp0int
      @darkp0int 3 роки тому

      @@RingZeroLabs thanks. i will read it first

  • @techyamanbyte
    @techyamanbyte 3 роки тому

    is it compulsury to use android emulator ?? or we can use mobile device

    • @RingZeroLabs
      @RingZeroLabs  3 роки тому +1

      Yes you can absolutely use a physical mobile device and that is the preferred method. It will run much smoother than the emulator. But not everyone has physical Android phones laying around, so the emulator is more universal.

  • @fighter_osama
    @fighter_osama 3 роки тому

    Good bro keep work

  • @Rana-yc6yt
    @Rana-yc6yt 3 роки тому

    how can i see the payload? for request

    • @RingZeroLabs
      @RingZeroLabs  3 роки тому

      With the traffic routed through the MITM proxy you should be able to see any payloads under https. The payloads may be obfuscated further underneath https, but this MITM technique will at least strip away https so you can see the underlying traffic.

  • @jabkamda5822
    @jabkamda5822 3 роки тому +1

    666 views Xd

  • @youngbos305
    @youngbos305 3 роки тому

    How can I contact you I want yo pay you to set this up for me please