Skip to main content

How to intercept HTTPs traffic from Android Emulator

Capturing HTTPS traffic from an Android device can be a crucial aspect of testing and debugging applications. Additionally, gaining insight into decrypted HTTPS messages can offer valuable information for troubleshooting or security analysis, albeit with ethical considerations in mind. Here, we explore two methods to achieve this: via an HTTPs proxy or a VPN.

Methods:

  • HTTPs Proxy:

    • Using an HTTPS proxy is a common approach to intercepting traffic from an Android device. This method involves setting up a proxy server that acts as an intermediary between the device and the internet, allowing for the capture and analysis of HTTPS requests and responses.
    • However, you have to install the Proxy SSL certificate on the Android device to facilitate decryption.
  • VPN Server:

    • Alternatively, leveraging a Virtual Private Network (VPN) can intercept HTTPS traffic from an Android device. By directing traffic through a VPN server, it becomes feasible to capture and analyze HTTPS requests and responses in transit.

Tools:

  • MITM (Man In The Middle) Proxy: A versatile tool for intercepting and modifying HTTP and HTTPS traffic.
  • Proxyman: A user-friendly proxy tool with advanced features tailored for macOS and iOS devices, but also compatible with Android via manual proxy setup.
  • Fiddler Proxy: A robust proxy tool with powerful debugging capabilities, including support for decrypting HTTPS traffic.
  • Charles Proxy: A popular proxy tool known for its comprehensive debugging features, including SSL proxying for inspecting encrypted traffic.
  • HTTP Toolkit: A modern, cross-platform tool designed for intercepting, debugging, and mocking HTTP and HTTPS traffic.

Resources

https://medium.com/hackernoon/intercept-https-traffic-on-a-android-emulator-46023f17f6b3

https://httptoolkit.com/docs/guides/android/

https://proxyman.io/posts/2020-09-19-Intercept-https-traffic-on-android-emulator

https://kpj.github.io/misc/InterceptingHTTPTraffic.html

https://www.reddit.com/r/androiddev/comments/17nfwyn/easiest_way_to_inspect_network_traffic_coming/

https://docs.telerik.com/fiddler-everywhere/capture-traffic/capture-from-android

https://www.linkedin.com/pulse/intercept-sslhttps-traffic-perform-penetration-testing-mayank-grover/

https://www.reddit.com/r/androiddev/comments/14x8eed/way_or_viewing_network_requests/

https://beguier.eu/nicolas/articles/android-mitm-intercept-trafic.html