To use this method you will have to have a rooted Android phone. There are other methods to disable SSL Pinning like modifying the apk, for example apk-mitm, but that doesn't always work for me.
- Download and install frida and frida tools:
pip3 install frida frida-tools
- Download and install objection:
pip3 install objection
- Download frida server for architecture used by the phone you will use: https://github.com/frida/frida/releases
- Download adb included in platform-tools: Windows: https://dl.google.com/android/repository/platform-tools-latest-windows.zip Linux: https://dl.google.com/android/repository/platform-tools-latest-linux.zip
- Extract server file from the zx archive
- Move server file to /data/local/tmp/frida-server:
adb push <path-to-server-file> /data/local/tmp/frida-server
- Open terminal
- Open adb shell:
adb shell
- Get root access:
su
- Navigate to /data/local/tmp:
cd /data/local/tmp
- Start frida server:
./frida-server
- If you're getting permission denied, try updating server permission for executing:
chmod +x /frida-server
or if that doesn't work, you can trychmod 0777 ./frida-server
- If you're getting permission denied, try updating server permission for executing:
- Open a new terminal
- Start a new objection process on the app:
objection -g <com.app_name> explore
- Disable SSL Pinning:
android sslpinning disable
Congratulations, you successfully bypassed SSL pinning on your app and you can now intercept HTTP traffic with proxy tools like mitmproxy.