SSL Pinning Bypass

Xposed

Xposed is a framework for Android that lets you change how apps and the system behave without modifying the APKs or flashing a custom ROM.

Frida

Frida is a dynamic instrumentation framework that allows you to hook and change the mobile app's logic at runtime. Frida is so powerful that it "requires its own ultimate" guide to list all its features.

Objection

Frida Gadget

You can automate this by using the above Objection command:

Else, you can follow the manual way of patching the apk described in this guide.

Once the APK is patched, install Frida tools on the attacker machine using pip3 install frida-tools. After installing, you will see programs like frida, frida-ps, frida-Is-devices on your system.

Install the patched APK on an Android device and open it. The app waits till Frida connects to the Frida gadget. The output of

APKLAB

Android SSL Trustkiller

Inspeckage

Flutter Application

  • ProxyDroid for global tunneling

  • Frida scripts to bypass SSL pinning

  • reFlutter

  • Modify APK

  • Diable TLS Verification -> A Frida script that disables Flutter's TLS verification -> Read Here

Code to Add in “main.dart”

Modifying “main()":

With this setup, I could run ProxyDroid and intercept the application’s traffic without needing an SSL pinning bypass.

Last updated

Was this helpful?