blog.nviso.eu/2017/12/22/intercepting-https-traffic-from-apps-on-android-7-using-magisk-burp

Preview meta tags from the blog.nviso.eu website.

Linked Hostnames

24

Thumbnail

Search Engine Appearance

Google

https://blog.nviso.eu/2017/12/22/intercepting-https-traffic-from-apps-on-android-7-using-magisk-burp

Intercepting HTTPS Traffic from Apps on Android 7+ using Magisk & Burp

Intercepting HTTPS traffic is a necessity with any mobile security assessment. By adding a custom CA to Android, this can easily be done. As of Android Nougat, however, apps don't trust client certificates anymore unless the app explicitly enables this. In this blogpost, we present a new Magisk module, that circumvents this requirement, by automatically adding…



Bing

Intercepting HTTPS Traffic from Apps on Android 7+ using Magisk & Burp

https://blog.nviso.eu/2017/12/22/intercepting-https-traffic-from-apps-on-android-7-using-magisk-burp

Intercepting HTTPS traffic is a necessity with any mobile security assessment. By adding a custom CA to Android, this can easily be done. As of Android Nougat, however, apps don't trust client certificates anymore unless the app explicitly enables this. In this blogpost, we present a new Magisk module, that circumvents this requirement, by automatically adding…



DuckDuckGo

https://blog.nviso.eu/2017/12/22/intercepting-https-traffic-from-apps-on-android-7-using-magisk-burp

Intercepting HTTPS Traffic from Apps on Android 7+ using Magisk & Burp

Intercepting HTTPS traffic is a necessity with any mobile security assessment. By adding a custom CA to Android, this can easily be done. As of Android Nougat, however, apps don't trust client certificates anymore unless the app explicitly enables this. In this blogpost, we present a new Magisk module, that circumvents this requirement, by automatically adding…

  • General Meta Tags

    9
    • title
      Intercepting HTTPS Traffic from Apps on Android 7+ using Magisk & Burp – NVISO Labs
    • charset
      UTF-8
    • viewport
      width=device-width, initial-scale=1
    • robots
      max-image-preview:large
    • description
      Intercepting HTTPS traffic is a necessity with any mobile security assessment. By adding a custom CA to Android, this can easily be done. As of Android Nougat, however, apps don't trust client certificates anymore unless the app explicitly enables this. In this blogpost, we present a new Magisk module, that circumvents this requirement, by automatically adding…
  • Open Graph Meta Tags

    23
    • og:type
      article
    • og:title
      Intercepting HTTPS Traffic from Apps on Android 7+ using Magisk & Burp
    • og:url
      https://blog.nviso.eu/2017/12/22/intercepting-https-traffic-from-apps-on-android-7-using-magisk-burp/
    • og:description
      Intercepting HTTPS traffic is a necessity with any mobile security assessment. By adding a custom CA to Android, this can easily be done. As of Android Nougat, however, apps don’t trust clien…
    • og:site_name
      NVISO Labs
  • Twitter Meta Tags

    3
    • twitter:text:title
      Intercepting HTTPS Traffic from Apps on Android 7+ using Magisk & Burp
    • twitter:image
      https://blog.nviso.eu/wp-content/uploads/2017/12/step1.png?w=640
    • twitter:card
      summary_large_image
  • Link Tags

    29
    • EditURI
      https://blog.nviso.eu/xmlrpc.php?rsd
    • alternate
      https://blog.nviso.eu/feed/
    • alternate
      https://blog.nviso.eu/comments/feed/
    • alternate
      https://blog.nviso.eu/2017/12/22/intercepting-https-traffic-from-apps-on-android-7-using-magisk-burp/feed/
    • alternate
      https://blog.nviso.eu/wp-json/wp/v2/posts/3150

Emails

4
  • [email protected]
  • ?subject=%5BShared%20Post%5D%20Intercepting%20HTTPS%20Traffic%20from%20Apps%20on%20Android%207%2B%20using%20Magisk%20%26%20Burp&body=https%3A%2F%2Fblog.nviso.eu%2F2017%2F12%2F22%2Fintercepting-https-traffic-from-apps-on-android-7-using-magisk-burp%2F&share=email
  • [email protected]
  • [email protected]

Links

81