niklashigi / apk-mitm

🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection
https://npm.im/apk-mitm
MIT License
4k stars 353 forks source link

Can't see traffic of Apple TV app #33

Closed forty875 closed 3 years ago

forty875 commented 3 years ago

The main code of my apk i want to inspect traffic seems to be written in javascript with webpack. I patched apk with apk-mitm but no http/https traffic will be intercepted. Seems modify AndroidManifest, injecting ssl certificate is useless here or can anybody help in this case?

\assets\app : 2.js 2.js.LICENSE.txt app.js app.js.LICENSE.txt main.js

niklashigi commented 3 years ago

The main code of my apk i want to inspect traffic seems to be written in javascript with webpack

Can you share the APK you're trying to patch (preferably an APKPure link)?

no http/https traffic will be intercepted

What exactly do you mean by this? Does the app still work normally with the proxy enabled or is it showing you errors? Do you see encrypted requests or no requests at all?

forty875 commented 3 years ago

Sony Android TV apk: https://www.apkmirror.com/apk/apple-inc/apple-tv-android-tv/apple-tv-android-tv-2-1-release/apple-tv-android-tv-2-1-android-apk-download/ Fire TV apk: https://www.apkmirror.com/apk/apple-inc/apple-tv-fire-tv-variant/apple-tv-fire-tv-variant-5-1-release/apple-tv-fire-tv-variant-5-1-android-apk-download/

I mean both charles or mitmproxy don't show me any requests from this app...

niklashigi commented 3 years ago

I'm afraid I can't help you with this. Media apps like Apple TV usually have pretty sophisticated protections (WebSockets, non-HTTP protocols, tampering detection, more advanced certification pinning, ...) in place to prevent piracy of their video content and scraping of their metadata. apk-mitm was made for the 90% use case of reverse-engineering basic apps (like your average public transportation app) and was never intended to deal with these kinds of protections.

I'd recommend you to ask about this issue elsewhere.