Bypassing librust.so SSL Pinning on Android
Tags
attack-pattern: | Server - T1583.004 Server - T1584.004 Ssl Pinning - T1521.003 |
Common Information
Type | Value |
---|---|
UUID | 83422706-b0a4-428b-9f5e-5ac3c1227d8f |
Fingerprint | 26bcc1bb2f1432f9 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Oct. 17, 2024, 11:11 a.m. |
Added to db | Oct. 17, 2024, 1:48 p.m. |
Last updated | Dec. 23, 2024, 3:25 a.m. |
Headline | Bypassing librust.so SSL Pinning on Android |
Title | Bypassing librust.so SSL Pinning on Android |
Detected Hints/Tags/Attributes | 14/1/9 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 172 | ✔ | Reverse Engineering on Medium | https://medium.com/feed/tag/reverse-engineering | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | librust.so |
|
Details | Domain | 8 | libflutter.so |
|
Details | Domain | 1 | paritytech.github.io |
|
Details | Domain | 4694 | github.com |
|
Details | File | 1 | servercertverifier.html |
|
Details | Github username | 7 | nvisosecurity |
|
Details | Url | 1 | https://blog.nviso.eu/2022/08/18/intercept-flutter-traffic-on-ios-and-android-http-https-dio-pinning |
|
Details | Url | 1 | https://paritytech.github.io/try-runtime-cli/rustls/client/danger/trait.servercertverifier.html |
|
Details | Url | 1 | https://github.com/nvisosecurity/disable-flutter-tls-verification |