Abstract
With so much discussion around the topic of securing data in transit, I wanted to take a bit of time to dive into the actual process of SSL/TLS encryption and how Android and apps written for Android handle this. The best way to go about it is to get down and do the work, so in this chapter, we will see how to generate an SSL certificate, write a back-end API in Golang, and write an Android client to talk to that back end, and finally we will see how to intercept SSL traffic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Sheran Gunasekera
About this chapter
Cite this chapter
Gunasekera, S. (2020). Bypassing SSL Pinning. In: Android Apps Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1682-8_9
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1682-8_9
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1681-1
Online ISBN: 978-1-4842-1682-8
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)