Intercept HTTPS Traffic from Android App — AndroGoat -Part 3

Satish
AndroGoat
Published in
2 min readDec 9, 2020

In Intercept HTTPS Traffic from Android App — AndroGoat -Part 2 it was shown how to repackage the application to bypass network security config. In this section I’ll show you one more technique to bypass network security config to intercept https traffic from Android 7 or above devices with the help of Frida.

Steps:

1. Use Android device with Android 7 or above devices

2. Make sure Frida is installed and running as explained in Frida Installation

3. Uninstall any previous AndroGoat applications

4. Install AndroGoat app without network_security_config and open the app

5. Connect android device using USB to laptop

6. Download frida script that bypasses network_security_config settings from https://github.com/satishpatnayak/frida-training/blob/main/scripts/network_security_config.js

7. Run following command

frida -U -l network_security_config.js owasp.sat.agoat

8. Follow the steps from Intercept HTTPS Traffic from Android App — AndroGoat -Part 1

9. You should see request intercepted in Burp.

Happy Learning

Connect with me on GitHub and Twitter for more insights, updates and tools.

--

--