Intercepting Network Traffic with Burp Suite
Configuring Burp Suite for iOS Traffic Interception
Step 1: Set Up Burp Suite Proxy
1. Open Burp Suite and go to the Proxy tab. 2. Click Options and verify that a listener is running on port 8080 (default setting) or any port of your choice. Ensure that "All interfaces" is selected in the Bind to address field.
Step 2: Configure iOS Device Proxy Settings
You need to configure your iOS device to route its traffic through Burp Suite. 1. On your iOS device, go to Settings > Wi-Fi. 2. Tap the i icon next to your connected Wi-Fi network. 3. Scroll down to HTTP Proxy and set it to Manual. 4. Enter the following details:
Server: The IP address of your computer running Burp Suite (you can find it by running ifconfig or ipconfig on your computer).
Port: The port Burp Suite is listening on (default is 8080).
Server: 192.168.1.100
Port: 8080Installing Burp Suite CA Certificate
1. On your iOS device, open Safari and navigate to:
http://burp2. This will automatically download the Burp CA certificate (named cacert.der).
Step 2: Install the CA Certificate
After downloading, navigate to Settings > General > VPN & Device Management (or Profiles & Device Management depending on the iOS version).
You should see the Burp Suite Professional CA profile listed. Tap on it and install the certificate.
Go to Settings > General > About > Certificate Trust Settings.
Enable full trust for Burp Suite Professional CA by toggling the switch.
Bypassing SSL Pinning
Non-Jailbroken Device
Frida + Objection
Patch the App (Non-Jailbroken Devices)
JailBroken Device
Hooking Swift Methods Dynamically
Example of searching mangled Swift methods: Run this script to search for mangled methods that (partially) match class JailbreakDetection and method isJailbroken, and then you can target specific methods to hook.
Objection
Using SSL Kill Switch 2 (for Jailbroken Devices)
Last updated
Was this helpful?