Hack Android With Burp Suite (THE EASY WAY!)

  Рет қаралды 1,928

CorSecure

CorSecure

2 ай бұрын

Almost two years ago, I made a video where I showed you how to install a Burp Suite certificate on an Android device. This involved converting a user certificate into a system certificate, which can be a difficult and complicated process. Since then I have found a different way to install CA certificates on an Android device that is much easier.
The Magisk module I used in this video can be found here:
github.com/NVISOsecurity/Magi...
Check out my website:
corsecure.blog
Use my referral link to sign up for TryHackMe:
tryhackme.com/signup?referrer...

Пікірлер: 11
@AnnDylcreditrepair
@AnnDylcreditrepair 10 күн бұрын
Hey thanks so much for providing great videos that non tech masses can understand i am all subscribed looking forward to catching up on all your vids and sharing with everyone i know keep up the good work!
@AnnDylcreditrepair
@AnnDylcreditrepair 10 күн бұрын
Actually i just checked and it didnt transfer to system certs i am using android 14 or oxygen os 14 onepluses crappy version of android 14 is there anything you can suggest to get this to work i am also using a third party version of magisk kitsune mask witch is a canary magisk version thanks for any guidance.
@CorSecure
@CorSecure 10 күн бұрын
I haven't tried it with Android 14 yet, but I found this thread on github that has some potential fixes for issues people were having with Android 14. I've also never used kitsune magisk or Oxygen OS, so I don't really know if either of those may be causing issues. I hope this helps! github.com/NVISOsecurity/MagiskTrustUserCerts/issues/31
@lzn-o2e
@lzn-o2e 3 күн бұрын
Hello, how to use burp to capture app packets for two-way certificate detection?
@user-im7hc3bi2p
@user-im7hc3bi2p 2 ай бұрын
Which android emulator do you use?
@CorSecure
@CorSecure 2 ай бұрын
The phone I used in this video wasn't an emulator. It was a screen capture of a physical device. When I do use emulators, I usually use the official Android Studio emulator though. I have a few videos on my channel about setting up and working with an emulator.
@freeload101
@freeload101 2 ай бұрын
KK so not sure if you deleted my comment or it it was automated but I need help with my project Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE) on next steps hooking rev payloads etc .. but it's single click ps1 for windows that can be ported to *nix if you want but I use mod for the cert install too but it's dynamic so if you SSL cert changes you just click the button again.
@ugggamersltda2605
@ugggamersltda2605 2 ай бұрын
Hey please make 1 video about frida in phones no rooted
@CorSecure
@CorSecure 2 ай бұрын
I have this video where I went over how to use Objection with a non-rooted device. It doesn't have all the features of Frida, but it lets you bypass SSL pinning and lots of other common features powered by Frida. kzfaq.info/get/bejne/jreil5aKsJrNqoU.html
@lzn-o2e
@lzn-o2e 3 күн бұрын
Hello, how to use burp to capture app packets for two-way certificate detection?
@lzn-o2e
@lzn-o2e 3 күн бұрын
Hello, how to use burp to capture app packets for two-way certificate detection?
Defeat SSL Pinning | Android Security Crash Course
15:01
CorSecure
Рет қаралды 11 М.
How to Proxy Android Apps with Burp Suite | Hacking Android Apps
8:56
Jason Ford {JSON:SEC}
Рет қаралды 85 М.
I Can't Believe We Did This...
00:38
Stokes Twins
Рет қаралды 98 МЛН
Install a Burp Suite certificate in an Android emulator
14:16
CorSecure
Рет қаралды 15 М.
Intercepting Android App Traffic with BurpSuite
22:42
IppSec
Рет қаралды 43 М.
The Ultimate Guide to Gleam Concurrency
13:36
Isaac Harris-Holt
Рет қаралды 13 М.
SSL Pinning Bypass on Android with Frida (Step-by-Step Guide)
14:15
Rahad Chowdhury
Рет қаралды 19 М.
iPhone 16 с инновационным аккумулятором
0:45
ÉЖИ АКСЁНОВ
Рет қаралды 8 МЛН
ИГРОВОВЫЙ НОУТ ASUS ЗА 57 тысяч
25:33
Ремонтяш
Рет қаралды 352 М.