Intercepting and Analyzing Network Traffic with Burp Suite on Genymotion

Can Özkan
2 min readNov 4, 2023

As a reverse engineer, security professional or a penetration tester, one of the primary challenges we face is intercepting and analyzing network traffic between Android applications and remote servers. This is where the powerful combination of Genymotion and Burp Suite comes into play. In this blog post, we will delve into the process of how we direct network traffic from Android apps running on Genymotion to the Burp Suite intercepting proxy so that we analyze and tamper with network traffic.

Directing network traffic to Burp Suite is a crucial step in Android security for dynamic network behavior analysis, vulnerability identification, real-time analysis among others.

The concept behind it is rather simple. We need to export the certificate of Burp and import it as a trusted system certificate. Steps and commands are illustrated below.

This work has been supported in part by the Energy Transition Fund of the FPS Economy of Belgium through the CYPRESS project, and in part by the VLAIO COOCK program through the IIoT-SBOM project.

Thanks for reading.

Can Özkan

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Can Özkan
Can Özkan

Written by Can Özkan

Security Researcher, Penetration Tester, and Reverse Engineer

No responses yet

Write a response