Archive: Reverse engineering android application to capture data send through websocket
Budget
200$
per month
Posted: 5 years ago
Closed
- Description
- Hello I need help to reverse an android application
I'd like to capture some of the data the app is sending.
Here's what i've done so far :
- Bypass the SSL pinning.
- Use Charles/Burp/Mitmproxy : Shows only the HTTP(S) traffic but what i'm seeking wasn't there.
- Downloaded an app called SSLCapture : I found what i was looking for but now I must find a way to extract this.
So by analyzing the packets I found they are using websockets to send the data i'm interested in.
I found the websocket URL (something like wss://XXXX.firebase.io/) and connected to it but once i'm connected I don't receive any messages from it.
Someone told me they are maybe using some custom headers but I'm kinda lost at this point
Skills:
analysis,android application development,customization,extraction,mobile,reverse engineering,Secure Sockets Layer (SSL),web
- Category