Nytro Posted May 26, 2014 Report Posted May 26, 2014 Bypassing SSL Pinning on Android via Reverse EngineeringDenis Andzakovic – Security-Assessment.com15 May 2014Table of ContentsBypassing SSL Pinning on Android via Reverse Engineering ......................................................................... 1Introduction .................................................................................................................................................. 3Tools Used ..................................................................................................................................................... 3The Victim ..................................................................................................................................................... 3The Approach ................................................................................................................................................ 4Reversing ....................................................................................................................................................... 5Retrieving and Disassembling the APK ..................................................................................................... 5Patching .................................................................................................................................................... 6Patch at class instantiation ................................................................................................................... 6Patch the Class ...................................................................................................................................... 7Hijacking the Keystore .......................................................................................................................... 8Repacking and Running ........................................................................................................................... 10Tricks ........................................................................................................................................................... 11Information in Stack Traces .................................................................................................................... 11Decompiling into Java Code .................................................................................................................... 12References .................................................................................................................................................. 12Download: http://www.exploit-db.com/wp-content/themes/exploit/docs/33430.pdf Quote