
The app you’re working with is not doing certificate pinning in code. Burp Suite network proxy tool - grep/find/cut/uniq/cat/vim general linux command line tools to help sift through file content and find files by name/extension - jarsigner/zipalign/keytool command line tools to package and resign a new, modified.Your Android device is using the proxy (configured in the advanced settings for your WiFi connection), and the proxy can see TLS traffic through apps that will trust your CA by default (such as Chrome).Your Android device has the CA certificate that the proxy is using installed on the device as a user CA (search settings for Certificates).Then configure the android device to proxy through Burp. First of all, install the VPN on the laptop that is running Burp. You have the TLS intercept proxy of your choice up and running (such as Burp Suite). Hi Dhaval, Intercepting an application like this is usually possible, but it is an advanced topic so you should expect to do some experimenting and encounter some issues.
BURP SUITE ANDROID HOW TO
This article describes how to modify an app to make it trust user CA certificates. Apps can choose to trust only the system certificates, and apps that target API level 24 and higher do this by default.

However, Android distinguishes between certificates installed by the user and certificates that came with the operating system. To enable yourself as a man-in-the-middle for your own device, you can install custom certificate authorities (CAs) and configure the device to use an HTTP proxy just as you would a browser. These days, this traffic is TLS encrypted. When testing Android apps, one often wants to gain visibility into HTTP requests that the app makes in order to test the back-end services for security vulnerabilities.
