Interception of traffic in mobile applications

Authors

  • Fabian Alejandro Gibellini Universidad Tecnológica Nacional, Argentina
  • Sergio Ramon Quinteros Universidad Tecnológica Nacional, Argentina
  • Federico Javier Bertola Universidad Tecnológica Nacional, Argentina
  • Ileana Maricel Barrionuevo Universidad Tecnológica Nacional, Argentina
  • Marcelo Javier Auquer Universidad Tecnológica Nacional, Argentina
  • Ninfa Milagros Zea Cardenas Universidad Tecnológica Nacional, Argentina
  • Analia Lorena Ruhl Universidad Tecnológica Nacional, Argentina
  • German Nicolas Parisi Universidad Tecnológica Nacional, Argentina
  • Juliana Maria Notreni Universidad Tecnológica Nacional, Argentina
  • Leonardo Ramon Ciceri Universidad Tecnológica Nacional, Argentina
  • Ignacio Jose Sanchez Balzaretti Universidad Tecnológica Nacional, Argentina

Keywords:

cybersecurity, pentest, traffic interception

Abstract

The growing use of mobile devices leads to a greater use of mobile applications both for data search, use of social networks for banking transactions, purchases, etc. This has provided a new market for computer criminals. Most of these applications communicate with servers to send data. This communication is the one that is sought to be analyzed when carrying out security audits or forensic activities in a mobile application. In turn, this communication depends, among other things, on the operating system on which the application runs, the language of the application, the libraries implemented, the types of encryption applied, and the communication protocol. When analyzing the traffic of a mobile application, a framework is necessary that allows speeding up these configuration tasks and gives pentesters more time to analyze data traffic, since currently, the pentester has problems due to the diversity of techniques that must be tried to make the interception of traffic effective. This is the reason why current tools do not meet this need.

Downloads

Published

2023-07-24

Issue

Section

SACS - Simposio Argentino de Ciberseguridad y Ciberdefensa

How to Cite

Gibellini, F. A., Quinteros, S. R., Bertola, F. J., Barrionuevo, I. M., Auquer, M. J., Zea Cardenas, N. M., Ruhl, A. L., Parisi, G. N., Notreni, J. M., Ciceri, L. R., & Sanchez Balzaretti, I. J. (2023). Interception of traffic in mobile applications. JAIIO, Jornadas Argentinas De Informática, 9(8), 52-52. https://revistas.unlp.edu.ar/JAIIO/article/view/18174