Android: prevent sniffing (e.g. with CharlesProxy) of SSL traffic

后端 未结 2 792
萌比男神i
萌比男神i 2021-02-06 02:23

I use Charles to check what data is send throw my app to HTTPS. I installed the Charles CA cert on my phone and because of that, I\'m able to decrypt every SSL traffic.

2条回答
  •  萌比男神i
    2021-02-06 02:53

    ...I installed the Charles CA cert on my phone and because of that, I'm able to decrypt every SSL traffic.

    But I found apps, where I'm not possible to see the SSL traffic. How can I implement this behavior into my own app? With this, no man in the middle attack would be possible.

    This can be done with certificate/public key pinning, where you don't check the servers certificate against the local root certificates, but instead make sure that you only get the expected certificate. See OWASP for details and code samples.

提交回复
热议问题