Bypass SSL Pinning - Method 2: With Objection Explore
After the objection-altered APK (how to patch an APK with Objection) has been installed on our target device, running the app should result in a pause at the application startup screen. At this point, we can connect to a Frida server that should be listening on the device. If you prefer using the Frida utilities:
<OPEN THE APP>
$ objection explore
[usb] # android hooking search classes TrustManager
[usb] # android sslpinning disable


PreviousInstrumentation with Frida and ObjectionNextBypass SSL Pinning - Method 3: With root_bypass.js
Last updated