Monitoring browser network traffic on Android using mitmproxy


At this point, all of the traffic from that browser should be flowing through your mitmproxy instance. Android setup - On Android, it's a little less straightforward: Start mitmproxy on your desktop: Open that port on your desktop fire...



Onion Details



Page Clicks: 0

First Seen: 03/11/2024

Last Indexed: 10/21/2024

Domain Index Total: 195



Onion Content



Using mitmproxy to intercept your packets is a convenient way to inspect a browser's network traffic. It's pretty straightforward to setup on a desktop computer: Install mitmproxy ( apt install mitmproxy on Debian) and start it: mitmproxy --mode socks5 --listen-port 9000 Start your browser specifying the proxy to use: chrome --proxy-server="socks5://localhost:9000" brave-browser --proxy-server="socks5://localhost:9000" Add its certificate authority to your browser. At this point, all of the traffic from that browser should be flowing through your mitmproxy instance. Android setup On Android, it's a little less straightforward: Start mitmproxy on your desktop: mitmproxy --mode regular --listen-port 9000 Open that port on your desktop firewall if needed. On your Android device, change your WiFi settings for the current access point: Proxy: Manual Proxy hostname: 192.168.1.100 (IP address of your desktop) Proxy port: 9000 Turn off any VPN. Turn off WiFi. Turn WiFi back on. Open http://mitm.it in a browser to download the certificate authority file. Open the system Settings, Security and privacy , More security and privacy , Encryption & credentials , Install a certificate and finally choose CA certificate . Tap Install anyway to dismiss the warning and select the file you just downloaded. Once you have gone through all of these steps, you should be able to monitor (on your desktop) the HTTP and HTTPS requests made inside of your Android browsers. Note that many applications will start failing due to certificate pinning . Add a comment