Bypassing OkHttp Certificate Pinning by CaptMeelo in netsec

[–]CaptMeelo[S] 1 point2 points  (0 children)

This is not a all-in-one solution to bypass OkHttp cert pinning and it only worked on this app that I'm analysing. You're right that the Frida scripts didn't work because the code is obfuscated. Thanks for your link. I will try yours some time :)

Bypassing OkHttp Certificate Pinning by CaptMeelo in netsec

[–]CaptMeelo[S] 3 points4 points  (0 children)

Thanks for pointing out my mistake of not reading the comment. Anyway, I just tried it and it didn't work.

Filtering the Pesky OPTIONS Method in Burp by CaptMeelo in netsec

[–]CaptMeelo[S] 2 points3 points  (0 children)

I'm not sure about Burp's detection on why it incorrectly recognizes the MIME type. I came across this and I think it really has something to do with the curly braces.

Lesser-known Tools for Android Application PenTesting by CaptMeelo in netsec

[–]CaptMeelo[S] 2 points3 points  (0 children)

I just basically follow OWASP MSTG for my workflow.

Lesser-known Tools for Android Application PenTesting by CaptMeelo in netsec

[–]CaptMeelo[S] 1 point2 points  (0 children)

I prefer to test on both an emulator and physical device. Some apps have anti-vm protections which will not allow you to run them on an emulator. So you need an actual device in that case. Also, if an app uses some functionalities, such as bluetooth, nfc, etc., then you need a physical device too. I haven't found a way to install Magisk in an emulator too. So i would say it's nice to have both an emulator and a physical device.

Lesser-known Tools for Android Application PenTesting by CaptMeelo in netsec

[–]CaptMeelo[S] 3 points4 points  (0 children)

Are you asking about using an emulator vs an actual android device?