Jump to content
Nytro

Bypassing SSL Pinning on Android via Reverse Engineering

Recommended Posts

Posted

Bypassing SSL Pinning on Android via Reverse Engineering

Denis Andzakovic – Security-Assessment.com

15 May 2014

Table of Contents
Bypassing SSL Pinning on Android via Reverse Engineering ......................................................................... 1
Introduction .................................................................................................................................................. 3
Tools Used ..................................................................................................................................................... 3
The Victim ..................................................................................................................................................... 3
The Approach ................................................................................................................................................ 4
Reversing ....................................................................................................................................................... 5
Retrieving and Disassembling the APK ..................................................................................................... 5
Patching .................................................................................................................................................... 6
Patch at class instantiation ................................................................................................................... 6
Patch the Class ...................................................................................................................................... 7
Hijacking the Keystore .......................................................................................................................... 8
Repacking and Running ........................................................................................................................... 10
Tricks ........................................................................................................................................................... 11
Information in Stack Traces .................................................................................................................... 11
Decompiling into Java Code .................................................................................................................... 12
References .................................................................................................................................................. 12

Download: http://www.exploit-db.com/wp-content/themes/exploit/docs/33430.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...