Sniffing Proxy

To implement a sniffing proxy used to reverse engineer the private API, I’ll use tool called mitmproxy. You can use any other transparent HTTPS proxy. Charles is another example with a nice GUI. To make this work we need to set up the following things:

Configure your phone’s WiFi connection default gateway to be the proxy (so that the proxy is in middle and all the packets pass through) Install proxy’s certificate on the phone (so that the client has the proxy’s public key in its trust store)

Check your proxy’s documentation about installing the certificate. Here are the instructions for mitmproxy. And here is the certificate PEM file for iOS.

There isa script that reads mitmproxy dump file and generates a curl string – https://gist.github.com/nderkach/bdb31b04fb1e69fa5346

Leave a Reply

Your email address will not be published. Required fields are marked *

+ 9 = 18