Replies: 2 comments 6 replies
-
|
Not sure about android, but I was able to bypass the certificate pinning by injecting frida + objection into the decrypted ipa. I believe you can do the same with android APKs. Give this a read. |
Beta Was this translation helpful? Give feedback.
-
|
Hey y'all! I first stumbled upon this repository this summer, when I too wanted to bypass certificate pinning on an Android emulator. I didn't quite find the solution quickly, but after several hours of trying different methods and scratching my hair, I found a way! Here's the link to an article I just finished writing about that: https://fowled.gitbook.io/bereal/articles/hacking-bereal
Actually, Frida doesn't seem to work on newer versions of the BeReal app on Android. Every time I ran the command to boot up the Frida server (not even injecting anything like a certificate unpinner), BeReal would just crash over and over, with the following error: That being said, I have only tested this with the inject mode and not the gadget one, as it seemed more complex. |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
Wondered which workflows you use to reverse engineer the Bereal…
Atm I'm mainly smali-modding the apk to remove cert pinning and using mitm proxy the intercept the traffic
Do you know if there are more efficient ways to do this?
Beta Was this translation helpful? Give feedback.
All reactions