Note-55808-1

Token ID: 2

ERC-721 1 Transfers

Metadata

{
  "title": "Mac 使用Android Studio 模拟器抓https",
  "tags": [
    "post"
  ],
  "summary": "最近在测试 apk 时发现使用常规的手段:导出 burp 证书 -> 安装证书 ->wifi 设置代理的手段无法抓到 https 的流量(用 proxifier,让安卓模拟器走 burp 代理也是可以的,但是不想搞),通过搜索引擎得知 Android7.0 及之后…",
  "sources": [
    "xlog"
  ],
  "external_urls": [
    "https://nancunyitong.xlog.app/ts_cjw9xgne24b2vklzgv"
  ],
  "date_published": "2023-05-18T09:10:03.505Z",
  "content": "最近在测试apk时发现使用常规的手段:导出burp证书->安装证书->wifi设置代理的手段无法抓到https的流量(用proxifier,让安卓模拟器走burp代理也是可以的,但是不想搞),通过搜索引擎得知Android7.0及之后,系统默认只信任系统证书,不再信任用户自己安装的证书,于是在多次尝试使用各类模拟器抓apk中https的报文失败后,还是选择了Android Studio。将证书安装到系统证书中\n##### 准备burp证书\n1、导出burp证书\n2、使用openssl更改证书格式,先将burp证书的der格式转成pem,再获取证书的hash\n```shell\nopenssl x509 -inform DER -in burp.der -out burp.pem \nopenssl x509 -inform PEM -subject_hash_old -in burp.pem\n```\n![](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170147.png)\n将文件名修改为获取到的hash.0\n```\nmv burp.pem 9a5ba575.0\n```\n\n##### 准备模拟器\n1、打开Andriod Studio,新建一个模拟器,详情见图。\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170330.png)\n\n系统镜像可以按需选择\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170402.png)\n\n填入模拟器的名字,设置模拟器的存储大小,给多点,免得安装空间不够用。\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170418.png)\n\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170432.png)\n\n2、使用emulator命令启动模拟器,命令的默认位置在/Users/{{用户名}}/Library/Android/sdk/emulator, 添加-no-snapshot-load 参数保存模拟器状态,否则重启模拟器之后需要重新执行adb root、remount命令然后修改证书权限。\n```shell\n查看所有模拟器   emulator -list-avds\n然后启动模拟器   emulator @Resizable_API_33 -writable-system -no-snapshot-load\n```\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170454.png)\n\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170513.png)\n\n\n##### 上传证书\n1、使用adb 命令重新挂载分区,使system可读写\n```shell\nadb root    进入root权限\nadb disable-verity    关闭分区检测功能\nadb reboot    重启设备\nadb remount    重新挂载分区,使system分区可读可写\n```\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170530.png)\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170545.png)\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170557.png)\n\n2、上传证书\n```shell\nadb push 9a5ba575.0 /sdcard    上传证书至/sdcard目录\nadb shell    进入系统,此时可以使用whoami查看是否为root用户\ncp /sdcard/9a5ba575.0 /system/etc/security/cacerts/    进入系统后将证书复制到系统证书目录下\nchmod 644 /system/etc/security/cacerts/9a5ba575.0    修改证书权限\n```\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170611.png)\n\n3、查看证书是否安装成功\n操作模拟器界面,进入设置(setting) --> 安全(security) --> 更多安全设置(more security settings) --> 加密与凭据(encryption & credentials) --> 信任的凭据(trusted credentials)\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170625.png)\n\n##### 配置WIFI代理\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170638.png)\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170649.png)\n\n成功抓包\n![image.png](https://raw.githubusercontent.com/nancunyitong/note_imges/master/picgo20230518170704.png)\n\n##### 参考文章\nhttps://www.freebuf.com/articles/system/347725.html\nhttps://developer.android.com/studio/run/emulator-commandline?hl=zh-cn#startup-options\nhttps://developer.android.com/studio/command-line/adb?hl=zh-cn\nhttps://juejin.cn/post/6844903645289398280\nhttps://android.stackexchange.com/questions/232234/why-adb-remount-retruns-remount-failed-on-android-emulator\n",
  "attributes": [
    {
      "value": "ts_cjw9xgne24b2vklzgv",
      "trait_type": "xlog_slug"
    }
  ]
}