Closed AdamAtomus closed 1 year ago
oh my god you are a legend
i have no idea how, if someone could write up how it works i can add a wiki
How did you acquire this info? I've been trying to MITM for a while and cannot seem to certificate unpin.
This is great but it would be nice if there was a guide/tutorial on how to generate your own session id in the future
Yeah, you can get one using an emulator + httptoolkit someone says you need to use frida but it gives me the same sessionid.
I'm glad it could be done in an emulator, not fond of putting that tiktok on my actual phone
This is great but it would be nice if there was a guide/tutorial on how to generate your own session id in the future
Yeah, you can get one using an emulator + httptoolkit someone says you need to use frida but it gives me the same sessionid.
What emulator do you use?
This is great but it would be nice if there was a guide/tutorial on how to generate your own session id in the future
Yeah, you can get one using an emulator + httptoolkit someone says you need to use frida but it gives me the same sessionid.
What emulator do you use?
nox
I've tried genymotion and android-86 to no avail
Permission to yoink and twist this for my shell script?
Permission to yoink and twist this for my shell script?
not stopping you :) though you should use your own sessionid
Thanks! I'll be looking into a way to get the session id directly through the command line as well. Will share any progress I have with that on discord.
@GnomedDev @matty45 I use mitmproxy to intercept device web traffic & grab an app-generated cookie/token in another application, and this can be done with an Android Studio emulator. You just need to install the cert at the root/system level.
https://docs.mitmproxy.org/stable/howto-install-system-trusted-ca-android/
You now need to authenticate with a sessionid generated by the app.