GithubHelp home page GithubHelp logo

tailoredaccessteam / androidproxy Goto Github PK

View Code? Open in Web Editor NEW

This project forked from vanhoefm/androidproxy

0.0 1.0 0.0 10 KB

Automatically exported from code.google.com/p/androidproxy

Python 100.00%

androidproxy's Introduction

Background: http://www.mathyvanhoef.com/2013/06/transparent-interception-of-android.html

What AndroidProxy does

This tool is designed to sit between the android emulator and your actuall proxy (Burp, WebScarab, Paros, etc). The goal is to enable you to easily intercept HTTPS traffic by sending the domain name (FQDN) to your actual proxy, instead of the IP adress. Your proxy is then able to create certificates for the correct domain name.

This is achieved by intercepting all DNS requests and rewriting the CONNECT command to CONNECT before it reaches your proxy. Normal HTTP traffic is left untouched. By intercepting all DNS request a unique IP address is associated with each domain (even if in reality the domains have the same IP). When an IP address is encountered in a CONNECT method we can lookup the unique IP address and find the corresponding domain name.

The problem in detail

The emulator is essentially acts as an invisible proxy for HTTPS traffic, forwarding CONNECT request to the proxy you configured. These CONNECT commands are to the destination IP, hence the destination URL is lost. As a result your proxy generates a certificate with as common name the IP address of the server. If the client verifies the common name this will cause an error. Now, if the destination of the HTTPS request is always to the same domain, you could hardcode this domain in tools like Burp Suite ("generate a CA-signed certificate with a specific hostname"). However, if HTTPS requests are made to multiple domains, intercepting them becomes very troublesome (especially if multiple domains are hosted in the same IP). This script solves that problem by intercepting both DNS requests and HTTP(S) traffic.

The above screenshot, taken from the wsec blog, shows the invalid certificate warning that is displayed when you don't use the AndroidProxy.

androidproxy's People

Contributors

vanhoefm avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.