Requirements
- Rooted device with ProxyDroid installed.
- “Computer” with Burp installed.
Let’s start
Launch Burp from your computer.
Proxy -> Options -> Proxy Listeners
Uncheck current “running” proxy, the Add a new Proxy Listener.
Choose:
- Bind to port: 8080
- Bind to address: All interfaces
From the button below, export CA certificate in DER format.
Now change the file extension into .cer and push it in a user-browsable folder on your device. E.g.: I connected the device to the computer and I used adb.
mv burpcert.der burpcert.cer adb push burpcert.cer /sdcard/Download
While you’re there, take note of your ip address (in this example I’ll use 192.168.1.69).
Device configuration
Settings -> Security -> Install certificates from storage
Select the pushed .cer certificate (obviously), and give it a name.
You’ll be warned that your traffic may be monitored (obviously).
Install ProxyDroid.
Configure:
- Host: your pc address
- Port: 8080
- Proxy Type: HTTP (no HTTPS, I’m sure!)
I suggest to choose, under Feature Settings, the Individual Proxy configuration so that you can choose only the app of which do you want to sniff the traffic.
Enable Proxy Droid and enjoy.
You must be logged in to post a comment.