Interception of traffic in mobile applications
Keywords:
cybersecurity, pentest, traffic interceptionAbstract
The growing use of mobile devices leads to a greater use of mobile applications both for data search, use of social networks for banking transactions, purchases, etc. This has provided a new market for computer criminals. Most of these applications communicate with servers to send data. This communication is the one that is sought to be analyzed when carrying out security audits or forensic activities in a mobile application. In turn, this communication depends, among other things, on the operating system on which the application runs, the language of the application, the libraries implemented, the types of encryption applied, and the communication protocol. When analyzing the traffic of a mobile application, a framework is necessary that allows speeding up these configuration tasks and gives pentesters more time to analyze data traffic, since currently, the pentester has problems due to the diversity of techniques that must be tried to make the interception of traffic effective. This is the reason why current tools do not meet this need.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Fabian Alejandro Gibellini, Sergio Ramon Quinteros, Federico Javier Bertola, Ileana Maricel Barrionuevo, Marcelo Javier Auquer, Ninfa Milagros Zea Cardenas, Analia Lorena Ruhl, German Nicolas Parisi, Juliana Maria Notreni, Leonardo Ramon Ciceri, Ignacio Jose Sanchez Balzaretti

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Acorde a estos términos, el material se puede compartir (copiar y redistribuir en cualquier medio o formato) y adaptar (remezclar, transformar y crear a partir del material otra obra), siempre que a) se cite la autoría y la fuente original de su publicación (revista y URL de la obra), b) no se use para fines comerciales y c) se mantengan los mismos términos de la licencia.











