In case you are accustomed to cellular penetration trying out and you probably did one ahead of, you almost certainly got here throughout this type of state of affairs when you wish to have to intercept the applying HTTP or HTTPS visitors the usage of your favourite proxy device akin to Burp Suite, Fiddler, Charles , and so on.
After editing the WIFI connection and including your proxy host and port there, you will have to instantly be capable of seize the HTTP/S visitors.
Alternatively, this type of approach isn’t at all times operating since some cellular packages are the usage of custom designed HTTP/S functionalities inside the instrument.
So what you will have to do to be able to seize all the HTTP/S visitors from the cellular instrument with out breaking you heads? it’s easy, use Vproxy!
Vproxy is a python script that constructed to briefly configure a PPTP VPN server that may redirect HTTP/S visitors on your favourite proxy example host.
This script was once constructed and take a look at on Kali-Linux and will have to paintings on any linux distribution
pip set up termcolor
Setup VPN server on localip and redirect visitors despatched from the shoppers (80,443) to proxy 192.168.1.10:8080
$sudo python vproxy.py -localip 192.168.1.9 -phost 192.168.1.10 -pport 8080 -port 80,443
- Lend a hand Penetration Testers behavior cellular safety overview more uncomplicated
- Intercept Cellular HTTP/S visitors from any cellular instrument
Configuring VPN Movies
IOS – https://www.youtube.com/watch?v=TC-xJ9rCTXU
Android – https://www.youtube.com/watch?v=bFeJZKX4O3A