Answer the question
In order to leave comments, you need to log in
How to intercept https traffic between android emulator and external server?
I want to see https traffic between my program running on the Android emulator and an external service. I try to do as described here and it works for http (without "s"). It doesn't work for https. What's wrong? Do you need to somehow specifically configure traffic redirection through an https proxy in your program?
Answer the question
In order to leave comments, you need to log in
For the device:
1) We take burp
2) We launch firefox through it to any https site. In the certificate warning window, extract the burp root certificate, throw it into the root of the sd card of the android phone.
3) In the phone Settings -> Security -> Install from storage, install the root certificate.
4) In the Wi-Fi settings on the phone, specify the proxy server address. Ready!
For emulator:
code.google.com/p/androidproxy/
Doesn't work because https. Is your HTTPS server? If yours, then usually such proxies have a setting where you can specify the private key of the server, then the proxy will be able to decrypt traffic. If there is no such setting in the proxy, then you can listen to traffic with Wireshark, it can listen to SSL traffic with a private key. Well, if the server is not yours, but it is, as it were, according to the idea of the protocol, that no one can listen to it.
You need to install a certificate. Very easy to do www.cantoni.org/2013/11/06/capture-android-web-tra...
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question