Hi Hemang,
Certificate Pinning is a client-side security measure that can be
bypassed by manipulating the application or its environment.
Applications can be disassembled to remove or manipulate the
certificate pinning logic. It may also be possible to switch the
certificate embedded within the application with another.
Some tools exist for different mobile platforms which can
automatically disable certificate pinning.
For iOS Applications
Both of the following tools need jailbroken / rooted devices as they
manipulate the application or device during runtime to disable
Certificate Pinning.
iOS SSL Kill Switch patches low-level SSL functions within the Secure
Transport API -
https://github.com/iSECPartners/ios-ssl-kill-switch
iOS TrustMe disables SecTrustEvaluate -
https://github.com/intrepidusgroup/trustme
For Android Applications
Android-SSL-TrustKiller hooks various runtime methods to bypass
certificate pinning -
https://github.com/iSECPartners/Android-SSL-TrustKiller
android-ssl-bypass uses a JDWP debugger using the JDI APIs -
https://github.com/iSECPartners/android-ssl-bypass
Regards,
Chetan G.
On 11/26/16, Hemang Sandhu <
hemang...@gmail.com> wrote:
> Hi,
>
> Is there any document or steps to confirm whether Android mobile
> application having SSL pinning or not ?
>
> Things I know :-
>
> - CASE 1:- If you are able to intercept only first request and not
> other, then you can say there is SSL Pinning in the .apk
> - CASE 2:- If code is not obfuscated then check for “X509TrustManager"
> OR “checkClientTrusted” OR “checkServerTrusted” ==> In this case many a
> times I have observed that I am able to find the above keyword in the
> code
> thought there is no SSL Pinning.
>
> [Not sure I am correct in above two cases or not]
>
> So How to verify or confirm application having SSL Pinning or not and my
> above 2 case is correct ?
>
> Regards,
> Hemang
>
>
>
> --
> ______________________________________________________________________________
> null - Spreading the right Information
> null Mailing list charter:
>
http://null.co.in/section/about/null_list_charter/
> ______________________________________________________________________________
> nullcon 8-bit, Goa (Feb 28 - Mar 04, 2017)
>
http://nullcon.net
> ---
> You received this message because you are subscribed to the Google Groups
> "null" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
null-co-in+...@googlegroups.com.
> Visit this group at
https://groups.google.com/group/null-co-in.
> For more options, visit
https://groups.google.com/d/optout.
>
--
*Best Regards*
Chetan G.
m: (+91) 996 078 0908
@:
chetang...@gmail.com