Thursday, June 1, 2023

Proxying Newer Versions Of Android With Genymotion

 I did a quick video last night for someone on proxying the newer version of Android SDK with Genymotion as the changes back in version 7 make it a bit more difficult to proxy https traffic and I get a lot of questions on a regular basis even years later... 

Hopefully this video helps anyone else out that may be running into the same troubles.. This is proxying the latest version of android as of this writing which is version 10 but should work just fine on newer versions unless there is a major change in the future again that specifically restricts this method.. 


Mobile Hacking - Proxying Newer Versions of Android with Burp and Genymotion:




You can follow along with the video but additionally for reference below are the commands used: 



Step 1: Create a Burp Cert for Android

  1. Export the certificate from burp to .DER format via the proxy tab import/export

  2. Change the format from der to pem: 

       openssl x509 -inform DER -in cacert.der -out cacert.pem


  3. Pull the hash of the certificate subject name and rename the cert to the hah.0 format: 

       openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1

       mv cacert.pem <hash>.0


Step 2: Create a new Emulator: 

  1. Create a version 10 Galaxy x10 with bridge mode networking (or whatever newest version required)

  2. Click 3 dots under my installed devices in genymotion --> Edit --> Change to bridged mode


Step 3: Setup certificate on device

  1. Check devices and push the certificate to the SD card: 

     adb devices

     adb push <hash.0> /sdcard/


  2. Connect to the device and install the cert with proper permissions: 

     adb remount

     adb shell

     mv /sdcard/<hash.0> /system/etc/security/cacerts/

     chmod 644 /system/etc/security/cacerts/<hash.0>


  3. Reboot the device: 

     reboot


Step 4: Verify and setup the proxy: 

  1. Settings --> search for Trusted --> Scroll down till you see portswigger

  2. Setup your Burp proxy to the correct IP/Port combo of your external interface IP

  3. In Genymotion click Settings --> wifi  --> Gear -> Pencil Icon -> Add in Proxy info under advanced

  4. Go forth and proxy things

Related links


  1. Hacker Tools For Pc
  2. Free Pentest Tools For Windows
  3. Hacking Tools Free Download
  4. Tools 4 Hack
  5. Hacking Tools Free Download
  6. Hacking Tools Kit
  7. Hacking Tools Pc
  8. Hackrf Tools
  9. Hacker Search Tools
  10. Hack App
  11. Hack Tools For Mac
  12. Pentest Tools Free
  13. Pentest Tools Windows
  14. Wifi Hacker Tools For Windows
  15. Pentest Tools For Android
  16. Hacking Tools Hardware
  17. Physical Pentest Tools
  18. Pentest Tools For Mac
  19. Hacker Tools For Ios
  20. Android Hack Tools Github
  21. Pentest Reporting Tools
  22. Hack And Tools
  23. Hack Tools Mac
  24. Hacker Search Tools
  25. Hacking Tools Usb
  26. Hack Tools Online
  27. Hacker Tools Software
  28. Kik Hack Tools
  29. Hacking App
  30. Hackers Toolbox
  31. Growth Hacker Tools
  32. Pentest Tools Port Scanner
  33. Hacking Tools For Kali Linux
  34. Easy Hack Tools
  35. Pentest Tools For Windows
  36. Free Pentest Tools For Windows
  37. Best Hacking Tools 2020
  38. Hack Tool Apk No Root
  39. Hacker Security Tools
  40. Wifi Hacker Tools For Windows
  41. Nsa Hacker Tools
  42. Best Pentesting Tools 2018
  43. Hacker
  44. Pentest Tools Online
  45. Github Hacking Tools
  46. Hacking Tools For Kali Linux
  47. Hack Tools Mac
  48. Hack And Tools
  49. Hacking Tools For Windows Free Download
  50. Physical Pentest Tools
  51. Hack Tools For Pc
  52. Hack Tools Download
  53. Hack Tools Mac
  54. Hacking Apps
  55. Hacking Tools
  56. Hack Tools For Windows
  57. Black Hat Hacker Tools
  58. Bluetooth Hacking Tools Kali
  59. Hacks And Tools
  60. Pentest Tools Android
  61. Termux Hacking Tools 2019
  62. Pentest Automation Tools
  63. Hack Rom Tools
  64. Pentest Automation Tools
  65. Pentest Tools Port Scanner
  66. Physical Pentest Tools
  67. Hacker Techniques Tools And Incident Handling
  68. Pentest Tools Linux

No comments:

Post a Comment