Bypassing librust.so SSL Pinning on Android
Common Information
Type Value
UUID 83422706-b0a4-428b-9f5e-5ac3c1227d8f
Fingerprint 26bcc1bb2f1432f9
Analysis status DONE
Considered CTI value 0
Text language
Published Oct. 17, 2024, 11:11 a.m.
Added to db Oct. 17, 2024, 1:48 p.m.
Last updated Dec. 23, 2024, 3:25 a.m.
Headline Bypassing librust.so SSL Pinning on Android
Title Bypassing librust.so SSL Pinning on Android
Detected Hints/Tags/Attributes 14/1/9
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 172 Reverse Engineering on Medium https://medium.com/feed/tag/reverse-engineering 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 1
librust.so
Details Domain 8
libflutter.so
Details Domain 1
paritytech.github.io
Details Domain 4694
github.com
Details File 1
servercertverifier.html
Details Github username 7
nvisosecurity
Details Url 1
https://blog.nviso.eu/2022/08/18/intercept-flutter-traffic-on-ios-and-android-http-https-dio-pinning
Details Url 1
https://paritytech.github.io/try-runtime-cli/rustls/client/danger/trait.servercertverifier.html
Details Url 1
https://github.com/nvisosecurity/disable-flutter-tls-verification