552
WhatsApp running through android-translation-layer (no container!) on Linux desktop
(lemmy.kde.social)
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
I hope this makes it easier to do TLS sniffing and security research on Android apps. A lot of developers seem to rely on no one simply looking at how much information is exposed in the APIs apps use. Currently because it's much more difficult to sniff Android apps, a lot of privacy/security issues are not raised.
Can't it be reverse engineered? It's java bytecode.
It's difficult
As long as it's installed on a device you control it's pretty easy to sniff TLS traffic from an Android application, even if they're pinning certs. I do this all the time for work. Frida makes it extremely easy, even giving you the ability to edit boringssl if something important is happening in native code. I've had to do this a couple times.
If you don't have root you'll have to recompile the application though which could matter if you need the signature to not change, but that isn't a common requirement.
It'd be nice to have a better way to test though; I've wanted to check out Waydroid. Some coworkers just use an emulator which works great if it doesn't need specific hardware.
There's PCAPdroid mitm for tls.