I have been working for a few days to get burp suite to perform interception with my android phone and emulators. I have been using a burp extension called noPE (Non-HTTP Protocol Extension). all interceptions function in the normal http history, certs were installed properly on rooted phone, but the extension shows very minimal dns requests (one every few minutes to googleapis) and doesn't show the port monitor at all, nothing in the tcp history either.
[link] [comments]
from hacking: security in practice https://ift.tt/prwqohS
Comments
Post a Comment