Proxying Android Traffic through Burp Suite (incl credential fuzzing & IDORs)

  Рет қаралды 20,021

Intigriti

Intigriti

Күн бұрын

Пікірлер: 31
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
Fantastic work as always ladies and gentlemen ..
@intigriti
@intigriti Жыл бұрын
🙏🥰
@PinkDraconian
@PinkDraconian Жыл бұрын
Once again, an amazing video! This is pure gold! 🥇
@intigriti
@intigriti Жыл бұрын
Awwww thanks mate 🙏🥰
@tan.nicolas
@tan.nicolas Жыл бұрын
top notch!
@intigriti
@intigriti Жыл бұрын
🙏🥰
@srcybersec1736
@srcybersec1736 Жыл бұрын
❤❤❤
@intigriti
@intigriti Жыл бұрын
💜💜💜
@waterlord6969
@waterlord6969 Жыл бұрын
This is so amazing!! Thank you very much!!!
@novianindy887
@novianindy887 Жыл бұрын
does this overcome the Certificate Pinning technique that prevents android app proxying ? and is there anything we, android app developers, can do to prevent this burpsuite proxying? please.
@intigriti
@intigriti Жыл бұрын
No, you would still need to deal with cert pinning for apps that require it (you can use frida to do this, similar to the root bypass video but I am meaning to get round to a separate video on this - probably showing HackTheBox's "pinned" challenge walkthrough). Honestly, I don't think there's much you can do to prevent users proxying traffic.. You could make the barrier higher by adding root detection and anti-frida techniques but a motivated hacker will find a way.
@novianindy887
@novianindy887 Жыл бұрын
@@intigriti nice, yes we need videos on how to bypass the cert pinning , please 🙏👍
@gwnbw
@gwnbw Жыл бұрын
Got my setup working and immediately found a bug in an app where I could set my own coins, list users, user and email, first + lastname. But they were not in a bug bounty, should I email the devs?
@intigriti
@intigriti Жыл бұрын
There's no harm in emailing devs if you think you've found an issue. However, if they specifically excluded it from bug bounty, there's a strong chance they are aware already (can't/won't fix).
@AbdAlkarimTube
@AbdAlkarimTube Жыл бұрын
Hello, The system in works fine with the proxy I can capture the requests throw webView etc.. But I can't intercept with any app ? What could it be ?
@intigriti
@intigriti Жыл бұрын
Not too sure what you mean 🤔 are you using the same app / config as the video?
@AbdAlkarimTube
@AbdAlkarimTube Жыл бұрын
@@intigriti same config but diff app
@itsm3dud39
@itsm3dud39 Жыл бұрын
is there any problem using lower version android ?
@intigriti
@intigriti Жыл бұрын
Probably not.. In fact, in the rootAVD video I found that I had to use less than API 28 (PIE) for the app to work: github.com/newbit1/rootAVD#notes
@itsm3dud39
@itsm3dud39 Жыл бұрын
what if an app doesnt support pie or lower version ?@@intigriti
@arkidgaming7133
@arkidgaming7133 Жыл бұрын
how about application that wont open with manual proxy?
@intigriti
@intigriti Жыл бұрын
Probably a cert pinning issue, you could check: www.netspi.com/blog/technical/mobile-application-penetration-testing/four-ways-bypass-android-ssl-verification-certificate-pinning
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
Great video, but I had a random question: do you find that sometimes apps don't work with the proxy and what do you do in that instance? Cheers! example: chrome will proxy just fine, http and https traffic but youtube (the app) won't. Do you have apps that sometimes just don't work well with the proxy? If yes, how did you get around it? Thanks :)
@intigriti
@intigriti Жыл бұрын
Hmmm good question! I haven't checked the YT app but I can understand why they would invest resources to prevent proxying traffic - after all, that's how adblocking apps would be developed. In many cases, it might just be that the app uses cert pinning, which you could try and get around using frida.
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
@intigriti that was my next logical step, thanks so much! Wishing you a great 2024. 👍 also it's mack_the_ripper, thank you so much for helping me out before. Looking forward to getting back on the platform next week. (Recovering from surgery)
@intigriti
@intigriti Жыл бұрын
Same to you mate! Hope your recovery goes well, take it easy 💜
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
@intigriti cheers geez
@djos0
@djos0 8 ай бұрын
~Great demo, would you mind sharing the passwords file you are using for bruteforcing
@intigriti
@intigriti 7 ай бұрын
Can you remind me what it's called in the video? It probably came from github.com/danielmiessler/SecLists
@snowden-IT
@snowden-IT Жыл бұрын
This is so amazing!! Thank you very much!!!
@panchakosha
@panchakosha Жыл бұрын
This is so amazing!! Thank you very much!!!
Intercepting Android App Traffic with BurpSuite
22:42
IppSec
Рет қаралды 59 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
小丑教训坏蛋 #小丑 #天使 #shorts
00:49
好人小丑
Рет қаралды 54 МЛН
Become a MASTER Hacker with Burpsuite!
29:43
Hacker Joe
Рет қаралды 30 М.
Introduction to Android Hacking
34:13
Intigriti
Рет қаралды 40 М.
Genymotion  - Proxying Android App Traffic Through Burp Suite | Cameron Cartier
13:52
Black Hills Information Security
Рет қаралды 18 М.
Android App Bug Bounty Secrets
20:14
LiveOverflow
Рет қаралды 108 М.
Three Ways to Hack Mobile Apps
43:41
John Hammond
Рет қаралды 116 М.
Hack Android With Burp Suite (THE EASY WAY!)
8:01
CorSecure
Рет қаралды 9 М.
They Say This Malware is INSANE
51:48
John Hammond
Рет қаралды 86 М.
Install Nessus for Free and scan for Vulnerabilities (New Way)
14:56