Intercepting and Analyzing Network Traffic with Burp Suite on Genymotion
As a reverse engineer, security professional or a penetration tester, one of the primary challenges we face is intercepting and analyzing network traffic between Android applications and remote servers. This is where the powerful combination of Genymotion and Burp Suite comes into play. In this blog post, we will delve into the process of how we direct network traffic from Android apps running on Genymotion to the Burp Suite intercepting proxy so that we analyze and tamper with network traffic.
Directing network traffic to Burp Suite is a crucial step in Android security for dynamic network behavior analysis, vulnerability identification, real-time analysis among others.
The concept behind it is rather simple. We need to export the certificate of Burp and import it as a trusted system certificate. Steps and commands are illustrated below.





This work has been supported in part by the Energy Transition Fund of the FPS Economy of Belgium through the CYPRESS project, and in part by the VLAIO COOCK program through the IIoT-SBOM project.
Thanks for reading.
Can Özkan