Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Charles Proxy has been in the industry for many years now. It's a common tool for basic reverse engineering.


Somewhat downplaying it. Charles is easily the most popular tool for reverse engineering client-server communications in mobile apps.

Certificate pinning frustrates Charles by hampering MITM attempts. It can be difficult to extract/replace pinned certificates from the latest versions of Android/iOS apps. Often you can extract them from older versions using specialized tools, if old-enough versions exist and those certificates are still valid for API endpoints of interest.


Yeah, I definitely did. lol

It's like saying IDA Pro is just an interesting piece of software for looking at binaries, but the grandparent comment is surely from someone who doesn't look at these utilities, so I guess that's why I didn't press it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: