Here is a follow up to my first post about using Burp Suite with a virtual device to set up a proxy.
(http://givemeroot.blogspot.com/2013/08/burp-suite-to-pen-test-android-app-on.html)
Using an emulator is a bit of a pain since it is really really slow. Also it does not support everything a phone might support (like some sensors etc)
** THIS WILL REQUIRE A ROOTED DEVICE**
So here is a tutorial on how to set up a proxy for your device and run burp to tamper data in transit or just observe the data go.
So the first few steps are going to be the same as they were for the other post where you run it for an emulator so I will just copy and paste them here
Step 5:
Setting the proxy
Install an app on your device that will let you set up a proxy. I prefer proxydroid, you can get it from the play store.
In the app all you need to do is set your laptop's ip and give it a port that burp is listening to.
Step 6:
Start Burp and you are good to go. :)
(http://givemeroot.blogspot.com/2013/08/burp-suite-to-pen-test-android-app-on.html)
Using an emulator is a bit of a pain since it is really really slow. Also it does not support everything a phone might support (like some sensors etc)
** THIS WILL REQUIRE A ROOTED DEVICE**
So here is a tutorial on how to set up a proxy for your device and run burp to tamper data in transit or just observe the data go.
So the first few steps are going to be the same as they were for the other post where you run it for an emulator so I will just copy and paste them here
Step 1:
Download Burp Suite from: http://portswigger.net/burp/download.html
Test if it is running by running it from terminal
$ java -jar -Xmx1024m burpsuite_free_v1.5.jar
Step 2:
Set up a Proxy in your browser:
“ … Chrome - The Chrome browser picks up the HTTP proxy settings configured on the host computer. If you are using Chrome, you can open your computer's built-in browser and follow the instructions for configuring that. If you aren't sure where the built-in proxy settings are, open Chrome, go to the Customize menu, select Settings, click on "Show advanced settings", and click the "Change proxy settings ..." button. This will open the relevant configuration options for your host computer.
Firefox - Go to the Firefox menu, click on Options, click on Advanced, go to the Network tab, and click on the Settings button in the Connection section. Select the "Manual proxy configuration" radio button. Enter your Burp Proxy listener address in the "HTTP proxy" field (by default, 127.0.0.1). Enter your Burp Proxy listener port in the "Port" field (by default, 8080). Make sure the "Use this proxy server for all protocols" box is checked. Delete anything that appears in the "No proxy for" field. Then click "OK" to close all of the options dialogs. …“
Step 3:
Downloading PortSwigger Certificate
Open a site on https (eg https://www.google.com) . Once you get the security warning click on I Understand the risk and add security exception. There click on View button.
Confirm that you see a PortSwigger certificate. Go to Details tab and export it. Save it with a .crt extension.
Step 4:
Install the certificate on the device.
There are multiple ways you can do it. For android >=4.2 all you need is to have the .crt file on the sdcard.
One possible way is to do
$ adb push PortSwiggerCA.crt /sdcard/
Or you can just use your file explorer and copy it there.
Once the file is there go to Settings -> Security. Select install certificate from sdcard. It should automatically find the certificate and give you an option to install it.
You may have to set up some kind of a phone locking mechanism if you don't have one already.Step 5:
Setting the proxy
Install an app on your device that will let you set up a proxy. I prefer proxydroid, you can get it from the play store.
In the app all you need to do is set your laptop's ip and give it a port that burp is listening to.
Step 6:
Start Burp and you are good to go. :)