Bypass SSL Pinning - non-rooted devices
With the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite
With the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
In this section, you will find the instructions to automates the entire process of getting an app to work with an HTTPS proxy.
You have these options in rooted devices:
Patch offline the APK using apk-mitm and then install it in a device: Bypass SSL Pinning - Method 1: apk-mitm
Use Objection Explore in runtime. When you run the app, it should result in a pause at the application startup screen. At this point, you can connect to a Frida server that should be listening on the device: Bypass SSL Pinning - Method 2: With Objection Explore
Use a script with Frida to automate the process of hooking the functions which avoid the interception traffic: Bypass SSL Pinning - Method 3: With root_bypass.js
Last updated