Intercepting Network Traffic with Burp Suite

Configuring Burp Suite for iOS Traffic Interception

Step 1: Set Up Burp Suite Proxy

1. Open Burp Suite and go to the Proxy tab. 2. Click Options and verify that a listener is running on port 8080 (default setting) or any port of your choice. Ensure that "All interfaces" is selected in the Bind to address field.

Step 2: Configure iOS Device Proxy Settings

You need to configure your iOS device to route its traffic through Burp Suite. 1. On your iOS device, go to Settings > Wi-Fi. 2. Tap the i icon next to your connected Wi-Fi network. 3. Scroll down to HTTP Proxy and set it to Manual. 4. Enter the following details:

  • Server: The IP address of your computer running Burp Suite (you can find it by running ifconfig or ipconfig on your computer).

  • Port: The port Burp Suite is listening on (default is 8080).

Server: 192.168.1.100
Port: 8080

Installing Burp Suite CA Certificate

1. On your iOS device, open Safari and navigate to:

http://burp

2. This will automatically download the Burp CA certificate (named cacert.der).

Step 2: Install the CA Certificate

  1. After downloading, navigate to Settings > General > VPN & Device Management (or Profiles & Device Management depending on the iOS version).

  2. You should see the Burp Suite Professional CA profile listed. Tap on it and install the certificate.

  3. Go to Settings > General > About > Certificate Trust Settings.

  4. Enable full trust for Burp Suite Professional CA by toggling the switch.

Bypassing SSL Pinning

Non-Jailbroken Device

  1. Frida + Objection

  1. Patch the App (Non-Jailbroken Devices)

JailBroken Device

  1. Frida

Hooking Swift Methods Dynamically

  • Example of searching mangled Swift methods: Run this script to search for mangled methods that (partially) match class JailbreakDetection and method isJailbroken, and then you can target specific methods to hook.

  • Manipulating Return Values: This script changes the return value of isJailbroken in JailbreakDetectionViewController to always return false.

  1. Objection

  1. Using SSL Kill Switch 2 (for Jailbroken Devices)

Last updated

Was this helpful?