This commit is contained in:
Traines 2025-01-11 18:15:13 +00:00
parent 41feb41b5a
commit 232893f2dc
3 changed files with 6 additions and 4 deletions

View file

@ -1 +0,0 @@
/docs/dumps/

View file

@ -2,7 +2,9 @@
In this directory, some intercepted traffic from DB Navigator. (Repo license does not apply to this directory.) In this directory, some intercepted traffic from DB Navigator. (Repo license does not apply to this directory.)
How to intercept: You can browse some responses of the bahn.de API and others in the [fixtures](https://github.com/public-transport/db-vendo-client/tree/main/test/fixtures) and [e2e fixtures](https://github.com/public-transport/db-vendo-client/tree/main/test/e2e/fixtures).
How to intercept DB Navigator traffic:
1. Download/extract Split APK 1. Download/extract Split APK
2. Merge APK (e.g. using [APKEditor](https://github.com/REAndroid/APKEditor)) 2. Merge APK (e.g. using [APKEditor](https://github.com/REAndroid/APKEditor))
@ -10,4 +12,4 @@ How to intercept:
4. edit [res/xml/network_security_config.xml](https://developer.android.com/privacy-and-security/security-config) to allow user CAs not just in debug 4. edit [res/xml/network_security_config.xml](https://developer.android.com/privacy-and-security/security-config) to allow user CAs not just in debug
5. recompile using apktool, sign 5. recompile using apktool, sign
6. install on an Android 6. install on an Android
7. intercept with a mitm decryption tool of your choice by installing CA cert into Android store (e.g. PCAPdroid with mitm addon) 7. intercept with a mitm decryption tool of your choice by installing CA cert into Android store (e.g. [PCAPdroid](https://github.com/emanuele-f/PCAPdroid) with [mitm addon](https://github.com/emanuele-f/PCAPdroid-mitm), no root needed)

View file

@ -13,7 +13,8 @@
"parse", "parse",
"format", "format",
"p", "p",
"docs" "docs",
"!docs/dumps/*"
], ],
"author": "Traines <git@traines.eu>", "author": "Traines <git@traines.eu>",
"contributors": [ "contributors": [