0x02 Install Postern on the phone and configure

0 18
ForewordIn the previous article, we shared how to capture the request packets of...

Foreword

In the previous article, we shared how to capture the request packets of Android APPs using Charles and Burpsuite. When capturing HTTPS request packets, you also need to import the certificate. After Android 7, Android no longer trusts user certificates, and you also need to import the user certificate into the system trusted credentials. Many applications in order to prevent packet capture will detect whether a proxy is used. If a proxy is found, the request will not be initiated. At this time, we can capture packets through VPN proxy.

0x00 Preparation

In this session, we use Postern (Postern is a very popular proxy / Virtual Private Network management program in the Android system, and is a global proxy tool under Android) to set the proxy, download the Postern apk: https://www.apkmonk.com/app/com.tunnelworkshop.postern/.

0x01 Configure Charles

0x02 Install Postern on the phone and configure

Select Proxy -> Proxy Settings, check the socks proxy, and configure the port

1658226976_62d689203ff83e5c7a6f8.png!small?1658226975600


0x02 Install Postern on the phone and configure

Download the Postern apk that is ready on the Android phone, and then configure the proxy after the Android

  • Select the configuration proxy, fill in the proxy server address, proxy port, and change the protocol type to socks5
  • Then, select the configuration rules, as shown in the figure below
  • Enable VPN option

1658226989_62d6892d67adbde31cc33.png!small?1658226988560

0x03 Packet Capture Attempt

Attempt to capture packets, can successfully capture https requests

1658226997_62d68935ab627f3a94983.png!small?1658226997096


0x04 Conclusion

This article shares the method of packet capture through Charles combined with VPN proxy. So far, many App request packets have been captured. However, in practical combat, some Apps have anti-packet capture checks, such as using SSL Pinning and two-way verification, etc. At this time, we need to adopt the corresponding bypassing and countermeasures technology, and the next article will continue to share the related technology of counter-packet capture.

你可能想看:

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

3.5 Configure EnableAutoConfiguration

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

APP Illegal Trend: Interpreting the 'Identification Method for Illegal and Unauthorized Collection and Use of Personal Information by APPs'

How to use truffleHog to search for high-entropy strings and sensitive data in Git repositories to protect the security of code repositories

Finally, choose the target source, establish a talent skill tree, which is convenient for accurately and quickly finding resumes

最后修改时间:
admin
上一篇 2025年03月25日 02:42
下一篇 2025年03月25日 03:05

评论已关闭