-
Notifications
You must be signed in to change notification settings - Fork 125
Description
I rarely need to modify a request/response, and am only really interested in seeing the requests/responses being made.
Besides this, I see many apps that do cert pinning where the most up-to-date techniques to circumvent them do not work.
So I purpose that instead it would be possible to dump the TLS session keys, and then using these to decrypt the traffic afterwards.
This is currently really easy/feasible on iOS, since many apps just using libboringssl, and can be done like so:
- https://github.com/jankais3r/Frida-iOS-15-TLS-Keylogger/blob/main/ios-tls-keylogger.js
- https://github.com/fkie-cad/friTap/blob/main/agent/ios/openssl_boringssl_ios.ts
I'm no expert in how httptoolkit works, or if this is a feature that is even wanted, but it is one I would like to see.
My idea would be to still use the proxy server, to get all the encrypted traffic, and use the anti-root detection bypass scripts combined with one that dumps the TLS session keys.
The proxy should then not do MITM, but only decrypt it using the provided keys. I'm very unsure how this works, as I've only played with it using Wireshark before.
Does this make sense? I could in theory help work on this, but the biggest hurdle would really be the proxy and decryption, which I haven't looked at yet.