The latest update including some breaking changes in the arguments.
In Android 7.0, Google introduced changes to the way user Certificate Authorities (CA) are trusted. These changes prevent third-parties from listening to network requests coming out of the application: More info:
- https://developer.android.com/training/articles/security-config.html
- http://android-developers.blogspot.com/2016/07/changes-to-trusted-certificate.html
This script injects into the APK network security exceptions that allow third-party software like Charles Proxy/Fiddler to listen to the network requests and responses of some Android applications.
Download the script and the XML file and place them in the same directory.
- Java Installed
The script arguments:
-
(optional) -d | --debuggable Make the new APK also debuggable
-
(optional) -k | --key-store [Signing Keystore] path to signing key
-
(optional) -b | --build-tools Set custom android build tools path
-
APK file path.
./addSecurityExceptions.sh myApp.apk
or
./addSecurityExceptions.sh -d --build-tools ~/Library/Android/sdk/build-tools/ -k ~/.android/debug.keystore myApp.apk