this post was submitted on 23 May 2024
4 points (55.9% liked)

Android

27537 readers
208 users here now

DROID DOES

Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules


1. All posts must be relevant to Android devices/operating system.


2. Posts cannot be illegal or NSFW material.


3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.


4. Non-whitelisted bots will be banned.


5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.


6. Memes are not allowed to be posts, but are allowed in the comments.


7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.


8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.


Community Resources:


We are Android girls*,

In our Lemmy.world.

The back is plastic,

It's fantastic.

*Well, not just girls: people of all gender identities are welcomed here.


Our Partner Communities:

!android@lemmy.ml


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Rustmilian@lemmy.world 16 points 3 months ago (1 children)
[–] Unforeseen@sh.itjust.works 8 points 3 months ago (1 children)

Wireshark won't show you anything if it's encrypted, other then a communication taking place. There's nothing stopping them from batching or otherwise obfuscating things through all kinds of means.

[–] Rustmilian@lemmy.world 4 points 3 months ago* (last edited 3 months ago) (1 children)

It entirely depends on how you set it up and where in the transport pipeline you're intercepting pockets from.

[–] kionite231@lemmy.ca 2 points 3 months ago (1 children)

how do you circumvent the HTTPS encryption?

[–] Rustmilian@lemmy.world 4 points 3 months ago* (last edited 3 months ago) (1 children)

By combining with other methods for intercepting HTTPS traffic, typically involving installing certificates or modifying system configurations like configuring your browser or operating system to log secret keys.

To break down the process of the cert method :

  • Device Trust: Install a trusted Root CA certificate (issued by you) on the Android device using Root permissions. This certificate tricks apps into trusting the proxy. Without Root level install the apps may reject the certificate as User Installed.
  • Device Routes Traffic : Configure the rooted Android device to route its traffic to the proxy on the separate system. This can be done through proxy settings.
  • Proxy Decryption : Configure the proxy to use the corresponding private key to decrypt the HTTPS traffic coming from your device, this key is generated when you created/issued the Root CA.
  • Traffic Inspection : With the traffic decrypted, you can use Wireshark configured to the proxy to inspect the traffic.
  • Proxy Re-encrypts and Forwards: After inspection, the proxy re-encrypts the traffic using a legitimate certificate and forwards it to the real website.
[–] Socsa@sh.itjust.works 2 points 3 months ago* (last edited 3 months ago) (1 children)

It would still be tedious to inspect every bit to ensure that a rogue service isn't just tacking chunks of noise onto a legitimate data stream. I'd argue that it's almost impossible to verify that every bit is legitimate unless you also control the host and know exactly what the traffic is supposed to look like.

[–] Rustmilian@lemmy.world 1 points 3 months ago

by "the host" you mean the server?
With the traffic decrypted it should be possible to automate the inspection process to some degree, but obviously milage may vary.