ByPass SSL Pinning with IP Forwarding | iptables
2021-12-08 15:14:08 Author: infosecwriteups.com(查看原文) 阅读量:236 收藏

If you wanna try, this is what we doing to bypass SSL Pinning in the mobile application.

  1. Creating Android emulator in genymotion, I used Google Pixel (8.0 API 26) as my Android virtual device
  2. Open virtual box, there is android Google Pixel listed in the machine list. and choose the Settings tab to configure adapter1 and adapter2 to Host-Only Adapter. please make sure the names are different (vboxnet0 for adapter 1 and vboxnet1 for Adapter2)

Google Pixel in Oracle VirtualBox Manager

Adapter 1 Configuration (default)

Adapter 2 Configuration (change from NAT to Host Only)

If you cannot find Adapter 2 in your android virtual box machine, just go in virtual box File -> Host Network Manager. and on network windows, choose to Create to make a new adapter, and don't forget to enable DHCP.

Network adapter configuration in android virtual box

3. Start your android emulator in Genymotion

4. Export burp certificate and install it in the android system as a Trusted certificate. (there are so many tutorials for this on the Internet).

5. The next step is to configure what port we will use for intercepting connections from the android device to our burp proxy. I usually use the 8081 port for a mobile connection. so, in burp proxy open Proxy tab -> Options -> Proxy Listeners -> add

Port Binding to 8081 and All Interfaces

Check the Support Invisible proxying checkbox

6. now, move to your kali, and see the IP addresses of all interfaces with ifconfig -a command, make sure there are 2 adapter names with vboxnet.

The wlan0 is an adapter for connecting to Internet, vboxnet0 and vboxnet1 are adapters from android emulator devices.

7. Let's configure our android network

Change the Wifi configuration to a static IP address I used 192.168.57.2 the default gateway and the DNS are automatically being set. (See the IP Address in vboxnet1)

choose the SAVE button, and as usual reboot your android virtual machine before going to the next step.

8. now the interesting part. we will configure the IP forwarding rule in the Kali Linux machine.

open your terminal in kali Linux and set the IP Forwarding to 1 (true) with this command (need root privileges):

echo 1 > /proc/sys/net/ipv4/ip_forward

set the IP Forwarding to True

9. exit from the root user, and set up IP tables for 80 and 443 port connection by executing this command

sudo iptables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE

sudo iptables -t nat -A PREROUTING -p tcp -i vboxnet1 — dport 80 -j REDIRECT — to-port 8081

sudo iptables -t nat -A PREROUTING -p tcp -i vboxnet1 — dport 443 -j REDIRECT — to-port 8081

You can change wlan0 to eth0 (device that used for Internet connection)

Now you can check your HTTPS traffic from your android is intercepted to your burp proxy.

all http/https are intercepted

Ok, hope this trick can be an alternative way to bypass the SSL Pinning problem.


文章来源: https://infosecwriteups.com/bypass-ssl-pinning-with-ip-forwarding-iptables-568171b52b62?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh