Aes-Killer V3.0 - Burp Plugin To Decrypt Aes Encrypted Traffic Of Mobile Apps On The Fly


Burpsuite Plugin to decrypt AES Encrypted traffic on the fly.


Requirements
  • Burpsuite
  • Java

Tested on
  • Burpsuite 1.7.36
  • Windows 10
  • xubuntu 18.04
  • Kali Linux 2018

What it does
  • The IProxyListener decrypt requests too encrypt responses, too an IHttpListener than encrypt requests too decrypt responses.
  • Burp sees the decrypted traffic, including Repeater, Intruder too Scanner, simply the client/mobile app too server come across the encrypted version.
NOTE: Currently back upwards AES/CBC/PKCS5Padding encryption/decryption.

How it works
  • Require AES Encryption Key (Can move obtained yesteryear using frida script or reversing mobile app)
  • Require AES Encryption Initialize Vector (Can move obtained yesteryear using frida script or reversing mobile app)
  • Request Parameter (Leave blank inward illustration of whole asking body)
  • Response Parameter (Leave blank inward illustration of whole reply body)
  • Character Separated amongst infinite for obfuscation on request/response (In illustration of Offuscation)
  • URL/Host of target to decrypt/encrypt asking too response

How to Install
Download jolt file from Release too add together inward burpsuite



Original Request/Response


Getting AES Encryption Key too IV
  • First setup frida server on IOS too Android device.
  • Launch Application on mobile device.
  • Run this frida script on your host car to popular off AES Encryption Key too IV.

Decrypt Request/Response
  • Provide SecretSpecKey nether Secret Key field
  • Procide IV nether Initialize Vector field
  • Provide Host/URL to filter asking too reply for encryption too decryption
  • Press Start AES Killer

 


Popular posts from this blog

Efiguard - Disable Patchguard Together With Dse At Kicking Time

Osweep - Don't Simply Search Osint, Sweep It

Telekiller - A Tool Session Hijacking In Addition To Stealer Local Passcode Telegram Windows