![]() ![]() If you're debugging your own app, rebuilding with the config change and using any test device you like is very quick and easy, and usually the simplest option. Use an emulator or a rooted device with HTTP Toolkit's ADB-based interception, to inject a system CA certificate.Make a small change to the app's config, so that it trusts user-installed CA certificates. ![]() To intercept secure HTTPS traffic from other apps on non-rooted devices, you'll need to either: HTTP Toolkit can automatically intercept, inspect & rewrite traffic from any Android device.įor a quick demo and an outline of how this works, check out the HTTP Toolkit for Android page, or read on for a detailed guide.įor many cases, including most browser traffic, emulators, and rooted devices, this works with zero manual setup required.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |