当前位置:   article > 正文

安卓7.0抓https包_android root抓包

android root抓包

安卓7.0抓https包
首先得有一台root的手机(小米MAX手机,刷三方recovery后 root)
然后导入fedder证书为系统信任的证书,即可完成抓包,开始……

1.导出fedder证书拿到证书FiddlerRoot.cer
查看证书信息 FiddlerRoot.cer
openssl x509 -in FiddlerRoot.cer -inform DER -noout -text

2.转FiddlerRoot.cer证书为.pem文件,生成certificate.pem
openssl x509 -in FiddlerRoot.cer -inform DER -out certificate.pem -outform PEM

3.获取重命名的证书名称(将生成certificate.pem文件重命名为,e5c3944b.0)
openssl x509 -subject_hash_old -in certificate.pem

e5c3944b
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----


将生成certificate.pem文件重命名为,e5c3944b.0

会输出证书的哈希值,如e5c3944b,得到的第一行e5c3944b将作为证书的文件名,将Fiddler的证书改名为e5c3944b,为什么要加.0是因为防止文件名冲突,如果你的根证书文件夹里面已经有这个文件名了,那就将.0 改为 .1,以此类推 



4.查看是否有重复
C:\Users\Administrator>adb shell
hydrogen:/ $ cd /system/etc/security/cacerts/
hydrogen:/system/etc/security/cacerts $ ls
00673b5b.0 21855f49.0 418595b9.0 6fcc125d.0 961f5451.0 bdacca6f.0 e442e424.0
02b73561.0 219d9499.0 450c6e38.0 72f369af.0 9685a493.0 bf64f35b.0 e48193cf.0
03f2b8cf.0 23f4c490.0 455f1b52.0 75680d2e.0 9772ca32.0 c491639e.0 e60bf0c0.0
04f60c28.0 262ba90f.0 48a195d8.0 76579174.0 9ab62355.0 c51c224c.0 e775ed2d.0
052e396b.0 27af790d.0 4be590e0.0 7672ac4b.0 9d6523ce.0 c7e2a638.0 e8651083.0
08aef7bb.0 2add47b6.0 4e18c148.0 7999be0d.0 9dbefe7b.0 c90bc37d.0 ea169617.0
0d5a4e1c.0 2d9dafe4.0 5046c355.0 7a819ef2.0 9f533518.0 cb156124.0 ed39abd0.0
0d69c7e1.0 2fa87019.0 524d9b43.0 7d453d8f.0 a0bc6fbb.0 cb1c3204.0 ee7cd6fb.0
10531352.0 33815e15.0 52b525c7.0 81b9768f.0 a2c66da8.0 ccc52f49.0 ee90b008.0
111e6273.0 33815e15.1 57692373.0 82223c44.0 a2df7ad7.0 cf701eeb.0 f61bff45.0
119afc2e.0 343eb6cb.0 58a44af1.0 8470719d.0 a3896b44.0 d06393bb.0 f80cc7f6.0
124bbd54.0 35105088.0 5a250ea7.0 85cde254.0 a7605362.0 d16a5865.0 fac084d7.0
12d55845.0 399e7759.0 5a3f0ff8.0 86212b19.0 a7d2cf64.0 d18e9066.0 facacbc6.0
1676090a.0 3a3b02ce.0 5cf9d536.0 87753b0d.0 a81e292b.0 d4c339cb.0 fb126c6d.0
17b51fe6.0 3ad48a91.0 5e4e69e7.0 882de061.0 ab5346f4.0 d5727d6a.0 fde84897.0
1dac3003.0 3c58f906.0 5f47b495.0 89c02a45.0 aeb67534.0 d59297b8.0 ff783690.0
1dcd6f4c.0 3c6676aa.0 60afe812.0 8d6437c3.0 b0ed035a.0 d66b55d9.0
1df5a75f.0 3c860d51.0 63a2c897.0 91739615.0 b0f3e76e.0 d6e6eab9.0
1e1eab7c.0 3c9a4d3b.0 6645de82.0 9282e51c.0 b3fb433b.0 d7746a63.0
1e8e7201.0 3d441de8.0 67495436.0 9339512a.0 b7db1890.0 dbc54cab.0
1eb37bdf.0 3e7271e8.0 69105f4f.0 9576d26b.0 b872f2b4.0 dfc0fe80.0
1f58a078.0 40dc992e.0 6e8bf996.0 95aff9e3.0 bc3f2570.0 e268a4c5.0

5.证书e5c3944b.0先导入到sdcdrd中,然后再移动到/system/etc/security/cacerts/目录中,导入为系统信任的证书
C:\Users\Administrator>adb push e5c3944b.0 /sdcard/
C:\Users\Administrator>adb shell
hydrogen:/ $ su
hydrogen:/ # mount -o rw,remount /system
hydrogen:/ # mv /sdcard/e5c3944b.0 /system/etc/security/cacerts/
hydrogen:/ # chmod 644 /system/etc/security/cacerts/e5c3944b.0
hydrogen:/ # reboot

6.大功告成!!!
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78

小米MAX手机,刷三方recovery后 root,亲测,可完成抓包
在这里插入图片描述

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/2023面试高手/article/detail/721638
推荐阅读
相关标签
  

闽ICP备14008679号