2024-12-16 20:22:36 +00:00
|
|
|
# Dumps from DB Navigator API app.vendo.noncd.db.de
|
|
|
|
|
2024-12-16 21:35:23 +00:00
|
|
|
In this directory, some intercepted traffic from DB Navigator. (Repo license does not apply to this directory.)
|
2024-12-16 20:22:36 +00:00
|
|
|
|
|
|
|
How to intercept:
|
|
|
|
|
|
|
|
1. Download/extract Split APK
|
|
|
|
2. Merge APK (e.g. using [APKEditor](https://github.com/REAndroid/APKEditor))
|
|
|
|
3. decompile using apktool
|
|
|
|
4. edit [res/xml/network_security_config.xml](https://developer.android.com/privacy-and-security/security-config) to allow user CAs not just in debug
|
|
|
|
5. recompile using apktool, sign
|
|
|
|
6. install on an Android
|
|
|
|
7. intercept with a mitm decryption tool of your choice by installing CA cert into Android store (e.g. PCAPdroid with mitm addon)
|