从Fiddler嗅探Android应用程序的HTTPS流量失败,并且Fiddler中只有"Tunnel To"条目 [英] Sniffing Android app's HTTPS traffic from Fiddler fails with only 'Tunnel To' entries in Fiddler

查看:78
本文介绍了从Fiddler嗅探Android应用程序的HTTPS流量失败,并且Fiddler中只有"Tunnel To"条目的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我正在尝试从根植的Android设备(4.4.4)捕获HTTPS流量,以分析应用程序未记录的协议.我已经将Fiddler设置为代理,并启用了HTTPS嗅探.我已经在设备上安装了Fiddler生成的根证书.我已经在Android设备上为Wifi设置了代理.

I am trying to capture HTTPS traffic from my rooted Android device (4.4.4) to analyze an undocumented protocol of an app. I've set up my Fiddler as a proxy and enabled HTTPS sniffing. I've installed the Fiddler's generated root certificate on my device. I've set up my proxy for my Wifi on my Android device.

  • 当我运行浏览器并导航到任何HTTP或HTTPS站点时,Fiddler可以成功捕获流量.

  • When I run my browser and navigate to any HTTP or HTTPS site, Fiddler can capture traffic successfully.

当我运行一些应用程序(例如,我自己的使用Parse作为后端的应用程序)时,我可以看到到服务器的所有HTTPS流量都已解密.到目前为止一切顺利.

When I run some apps (e.g. my own app which uses Parse as its backend), I can see all the HTTPS traffic to the servers, decrypted. So far so good.

当我尝试运行该特定应用程序时,我无法让Fiddler捕获其流量.这是我在Fiddler上获得的所有信息:

When I try to run that particular app, I can't get Fiddler to capture its traffic. Here's all I get on Fiddler:

URL是一些IP地址:SSL(:443).

URLs are some IP addresses:SSL (:443).

我也尝试使用ProxyDroid.有趣的是,我能够一次捕获流量,看到与该应用程序服务器的解密HTTPS连接,但是此后,它再也没有捕获.我知道该应用使用HTTPS,而不是未知/其他协议.

I've also tried using ProxyDroid. Interestingly, I was able to capture the traffic once, saw a decrypted HTTPS connection to that app's servers, but after that, it never captured again. I know that the app uses HTTPS, and not an unknown/other protocol.

如何才能成功捕获HTTPS流量,为什么Fiddler曾经在该应用程序上工作而突然停止工作?

How can I capture HTTPS traffic successfully, and why would Fiddler once work for that app, and suddenly stop working?

推荐答案

它似乎特定于该应用.我成功地嗅出了所有其他应用程序.那个特定的应用程序可能使用SSL固定:它会在自身内检查证书,即使设备信任它也不允许伪造证书.

It appears to be specific to that app. I was successfully able to sniff all the other apps. That particular app probably uses SSL pinning: it checks for certificate within itself and doesn't allow fake certificates even if it's trusted by the device.

这篇关于从Fiddler嗅探Android应用程序的HTTPS流量失败,并且Fiddler中只有"Tunnel To"条目的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆