intercepting-mobile-traffic-with-burpsuite
Intercepts and analyzes HTTP/HTTPS traffic from mobile applications using Burp Suite proxy to identify insecure API communications, authentication flaws, data leakage, and server-side vulnerabilities. Use when performing mobile application penetration testing, assessing API security, or evaluating client-server communication patterns. Activates for requests involving mobile traffic interception, Burp Suite mobile proxy, API security testing, or mobile HTTPS analysis.
Best use case
intercepting-mobile-traffic-with-burpsuite is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Intercepts and analyzes HTTP/HTTPS traffic from mobile applications using Burp Suite proxy to identify insecure API communications, authentication flaws, data leakage, and server-side vulnerabilities. Use when performing mobile application penetration testing, assessing API security, or evaluating client-server communication patterns. Activates for requests involving mobile traffic interception, Burp Suite mobile proxy, API security testing, or mobile HTTPS analysis.
Teams using intercepting-mobile-traffic-with-burpsuite should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/intercepting-mobile-traffic-with-burpsuite/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How intercepting-mobile-traffic-with-burpsuite Compares
| Feature / Agent | intercepting-mobile-traffic-with-burpsuite | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Intercepts and analyzes HTTP/HTTPS traffic from mobile applications using Burp Suite proxy to identify insecure API communications, authentication flaws, data leakage, and server-side vulnerabilities. Use when performing mobile application penetration testing, assessing API security, or evaluating client-server communication patterns. Activates for requests involving mobile traffic interception, Burp Suite mobile proxy, API security testing, or mobile HTTPS analysis.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Intercepting Mobile Traffic with Burp Suite ## When to Use Use this skill when: - Testing mobile application API endpoints for authentication, authorization, and injection vulnerabilities - Analyzing data transmitted between mobile apps and backend servers during penetration tests - Evaluating certificate pinning implementations and their bypass difficulty - Identifying sensitive data leakage in mobile network traffic **Do not use** this skill to intercept traffic from applications you are not authorized to test -- traffic interception without authorization violates computer fraud laws. ## Prerequisites - Burp Suite Professional or Community Edition installed on testing workstation - Android device/emulator or iOS device on the same network as Burp Suite host - Burp Suite CA certificate installed on the target device - For Android 7+: Network security config modification or Magisk module for system CA trust - For SSL pinning bypass: Frida + Objection or custom Frida scripts - Wi-Fi network where proxy configuration is possible ## Workflow ### Step 1: Configure Burp Suite Proxy Listener ``` Burp Suite > Proxy > Options > Proxy Listeners: - Bind to address: All interfaces (or specific IP) - Bind to port: 8080 - Enable "Support invisible proxying" ``` Verify the listener is active and note the workstation's IP address on the shared network. ### Step 2: Configure Mobile Device Proxy **Android:** ``` Settings > Wi-Fi > [Network] > Advanced > Manual Proxy - Host: <burp_workstation_ip> - Port: 8080 ``` **iOS:** ``` Settings > Wi-Fi > [Network] > Configure Proxy > Manual - Server: <burp_workstation_ip> - Port: 8080 ``` ### Step 3: Install Burp Suite CA Certificate **Android (below API 24):** ```bash # Export Burp CA from Proxy > Options > Import/Export CA Certificate # Transfer to device and install via Settings > Security > Install from storage ``` **Android (API 24+ / Android 7+):** Apps targeting API 24+ do not trust user-installed CAs by default. Options: ```bash # Option A: Modify app's network_security_config.xml (requires APK rebuild) # Add to res/xml/network_security_config.xml: # <network-security-config> # <debug-overrides> # <trust-anchors> # <certificates src="user" /> # </trust-anchors> # </debug-overrides> # </network-security-config> # Option B: Install as system CA (rooted device) openssl x509 -inform DER -in burp-ca.der -out burp-ca.pem HASH=$(openssl x509 -inform PEM -subject_hash_old -in burp-ca.pem | head -1) cp burp-ca.pem "$HASH.0" adb push "$HASH.0" /system/etc/security/cacerts/ adb shell chmod 644 /system/etc/security/cacerts/$HASH.0 # Option C: Magisk module (MagiskTrustUserCerts) ``` **iOS:** ``` 1. Navigate to http://<burp_ip>:8080 in Safari 2. Download Burp CA certificate 3. Settings > General > VPN & Device Management > Install profile 4. Settings > General > About > Certificate Trust Settings > Enable full trust ``` ### Step 4: Intercept and Analyze Traffic With proxy configured, open the target app and navigate through its functionality: **Burp Suite > Proxy > HTTP History**: Review all captured requests and responses. Key areas to analyze: - **Authentication tokens**: JWT structure, token expiration, refresh mechanisms - **API endpoints**: RESTful paths, GraphQL queries, parameter patterns - **Sensitive data in transit**: PII, credentials, financial data - **Response headers**: Security headers (HSTS, CSP, X-Frame-Options) - **Error responses**: Stack traces, debug information, internal paths ### Step 5: Test API Vulnerabilities Using Burp Repeater Forward intercepted requests to Repeater for manual testing: ``` Right-click request > Send to Repeater Test categories: - Authentication bypass: Remove/modify auth tokens - IDOR: Modify user IDs, object references - Injection: SQL injection, NoSQL injection in parameters - Rate limiting: Rapid request replay for brute force assessment - Business logic: Modify prices, quantities, permissions in requests ``` ### Step 6: Automate Testing with Burp Scanner ``` Right-click request > Do active scan (Professional only) Scanner checks: - SQL injection (error-based, blind, time-based) - XSS (reflected, stored) - Command injection - Path traversal - XML/JSON injection - Authentication flaws ``` ### Step 7: Handle Certificate Pinning If traffic is not visible due to certificate pinning: ```bash # Frida-based bypass (generic) frida -U -f com.target.app -l ssl-pinning-bypass.js # Objection bypass objection --gadget com.target.app explore ios sslpinning disable # or android sslpinning disable ``` ## Key Concepts | Term | Definition | |------|-----------| | **MITM Proxy** | Man-in-the-middle proxy that terminates and re-establishes TLS connections to inspect encrypted traffic | | **Certificate Pinning** | Client-side validation that restricts accepted server certificates beyond the OS trust store | | **Network Security Config** | Android XML configuration controlling app trust anchors, cleartext traffic policy, and certificate pinning | | **Invisible Proxying** | Burp feature handling non-proxy-aware clients that don't send CONNECT requests | | **IDOR** | Insecure Direct Object Reference -- accessing resources by manipulating identifiers without authorization checks | ## Tools & Systems - **Burp Suite Professional**: Full-featured web application security testing proxy with active scanner - **Burp Suite Community**: Free version with manual interception and basic tools - **Frida**: Dynamic instrumentation for runtime SSL pinning bypass - **mitmproxy**: Open-source alternative to Burp Suite for programmatic traffic analysis - **Charles Proxy**: Alternative HTTP proxy with mobile-friendly certificate installation ## Common Pitfalls - **Android 7+ CA trust**: User-installed certificates are not trusted by apps targeting API 24+. Must use system CA installation or app modification. - **Certificate transparency**: Some apps use Certificate Transparency logs to detect MITM. Check for CT enforcement in the app. - **Non-HTTP protocols**: Burp Suite only handles HTTP/HTTPS. Use Wireshark for WebSocket, MQTT, gRPC, or custom binary protocols. - **VPN-based apps**: Apps using VPN tunnels bypass device proxy settings. May need iptables rules on a rooted device to redirect traffic.
Related Skills
testing-mobile-api-authentication
Tests authentication and authorization mechanisms in mobile application APIs to identify broken authentication, insecure token management, session fixation, privilege escalation, and IDOR vulnerabilities. Use when performing API security assessments against mobile app backends, testing JWT implementations, evaluating OAuth flows, or assessing session management. Activates for requests involving mobile API auth testing, token security assessment, OAuth mobile flow testing, or API authorization bypass.
testing-for-xss-vulnerabilities-with-burpsuite
Identifying and validating cross-site scripting vulnerabilities using Burp Suite's scanner, intruder, and repeater tools during authorized security assessments.
performing-network-traffic-analysis-with-zeek
Deploy Zeek network security monitor to capture, parse, and analyze network traffic metadata for threat detection, anomaly identification, and forensic investigation.
performing-network-traffic-analysis-with-tshark
Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection, DNS anomaly identification, and IOC extraction from PCAP files
performing-mobile-device-forensics-with-cellebrite
Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications, location data, and application artifacts.
performing-mobile-app-certificate-pinning-bypass
Bypasses SSL/TLS certificate pinning implementations in Android and iOS applications to enable traffic interception during authorized security assessments. Covers OkHttp, TrustManager, NSURLSession, and third-party pinning library bypass techniques using Frida, Objection, and custom scripts. Activates for requests involving certificate pinning bypass, SSL pinning defeat, mobile TLS interception, or proxy-resistant app testing.
monitoring-scada-modbus-traffic-anomalies
Monitors Modbus TCP traffic on SCADA and ICS networks to detect anomalous function code usage, unauthorized register writes, and suspicious communication patterns. The analyst uses deep packet inspection with pymodbus, Scapy, and Zeek to baseline normal PLC/RTU communication behavior, then applies statistical and rule-based anomaly detection to identify reconnaissance, parameter manipulation, and denial-of-service attacks targeting Modbus devices on port 502. Activates for requests involving Modbus traffic analysis, SCADA network monitoring, ICS anomaly detection, PLC security monitoring, or OT network threat detection.
implementing-ot-network-traffic-analysis-with-nozomi
Deploy Nozomi Networks Guardian sensors for passive OT network traffic analysis to achieve comprehensive asset visibility, real-time threat detection, and vulnerability assessment across industrial control systems without disrupting operations, leveraging behavioral anomaly detection and protocol-aware monitoring.
implementing-network-traffic-baselining
Build network traffic baselines from NetFlow/IPFIX data using Python pandas for statistical analysis, z-score anomaly detection, and hourly/daily traffic pattern profiling
implementing-network-traffic-analysis-with-arkime
Deploy and query Arkime (formerly Moloch) for full packet capture network traffic analysis. Uses the Arkime API v3 to search sessions, download PCAPs, analyze connection patterns, detect beaconing behavior, and identify suspicious network flows. Monitors DNS queries, HTTP traffic, and TLS certificate anomalies across captured traffic.
implementing-mobile-application-management
Implements Mobile Application Management (MAM) policies to protect enterprise data on managed and unmanaged mobile devices through app-level controls including data loss prevention, selective wipe, app configuration, and containerization. Use when securing corporate apps on BYOD devices, implementing Intune App Protection Policies, or enforcing data separation between personal and work apps. Activates for requests involving MAM deployment, app protection policies, mobile containerization, or BYOD security.
hunting-for-domain-fronting-c2-traffic
Detect domain fronting C2 traffic by analyzing SNI vs HTTP Host header mismatches in proxy logs and TLS certificate discrepancies using pyOpenSSL for certificate inspection