apk-mitm-modified v0.11.2
apk-mitm
A CLI application that automatically prepares Android APK files for HTTPS inspection
Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works. However, with the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
apk-mitm automates the entire process. All you have to do is give it an APK file and apk-mitm will:
- decode the APK file using Apktool
- replace the app's Network Security Configuration to allow user-added certificates
- modify the source code to disable various certificate pinning implementations
- encode the patched APK file using Apktool
- sign the patched APK file using uber-apk-signer
You can also use apk-mitm to patch apps using Android App Bundle and rooting your phone is not required.
Usage
If you have an up-to-date version of Node.js (10+) and Java (8+), you can run this command to patch an app:
$ npx apk-mitm <path-to-apk>So, if your APK file is called example.apk, you'd run:
$ npx apk-mitm example.apk
✔ Decoding APK file
✔ Modifying app manifest
✔ Replacing network security config
✔ Disabling certificate pinning
✔ Encoding patched APK file
✔ Signing patched APK file
Done! Patched APK: ./example-patched.apkYou can now install the example-patched.apk file on your Android device and use a proxy like Charles or mitmproxy to look at the app's traffic.
Patching App Bundles
You can also patch apps using Android App Bundle with apk-mitm by providing it with a *.xapk file (for example from APKPure) or a *.apks file (which you can export yourself using SAI).
Making manual changes
Sometimes you'll need to make manual changes to an app in order to get it to work. In these cases the --wait option is what you need. Enabling it will make apk-mitm wait before re-enconding the app, allowing you to make changes to the files in the temporary directory.
If you want to experiment with different changes to an APK, then using --wait is probably not the most convenient option as it forces you to start from scratch every time you use it. In this case you might want to take a look at APKLab. It's an Android reverse engineering workbench built on top of VS Code that comes with apk-mitm support and should allow you to iterate much more quickly.
Caveats
If the app uses Google Maps and the map is broken after patching, then the app's API key is probably restricted to the developer's certificate. You'll have to create your own API key without restrictions and run
apk-mitmwith the--waitoption to be able to replace thecom.google.android.geo.API_KEYvalue in the app'sAndroidManifest.xmlfile.If
apk-mitmcrashes while decoding or encoding the issue is probably related to Apktool. Check their issues on GitHub to find possible workarounds. If you happen to find an Apktool version that's not affected by the issue, you can instructapk-mitmto use it by specifying the path of its JAR file through the--apktooloption.
Installation
The above example used npx to download and execute apk-mitm without local installation. If you do want to fully install it, you can do that by running:
$ npm install -g apk-mitmThanks
- Connor Tumbleson for making an awesome APK decompiler
- Patrick Favre-Bulle for making a very simple tool for signing APKs
- Ryan Welton for inspiring most of the certificate pinning removal code
License
MIT © Niklas Higi
5 years ago