Dev Genius

Coding, Tutorials, News, UX, UI and much more related to development

Follow publication

Member-only story

Easy Setup Charles Proxy to Intercept HTTPS traffic of Android Emulator

Kidd Tang
Dev Genius
Published in
3 min readMar 19, 2021

--

For Web or App development, typically you are required to debug and look into the HTTPS traffic of your applications. To intercept the traffic, you have to use the Man-in-the-middle technique to decrypt and encrypt between your application and the API endpoint.

Let’s us walkthrough in detail with Android Emulator …

A. Setup Android Emulator (in Android Studio)

You have to use the emulator system image without Play Store

Pick the image without Play Store Icon
Using Android Q
(Optional) Show Advanced Settings → Set to “Cold boot”

New folder storing the emulator will be created at %USERPROFILE%\.android\avd

B. Export Root Certificate

Save the Charles Root Certificate

Rename this “pem” file to android specific format certificate file.

You can use the openssl in Git Bash

openssl x509 -inform PEM -subject_hash_old -in charles.pem | head -1

name format as “<hash-value>” + “.0”
(simply concatenate “.0” as a string with the hash value string)

C. Start Emulator

Emulator Path in Windows
%LOCALAPPDATA%\Android\Sdk\emulator

cd %LOCALAPPDATA%\Android\Sdk\emulator emulator -avd Pixel_3a_XL_API_29 -writable-system -no-snapshot-load

D. Root & Push Root Certificates

ADB Path in Windows
%LOCALAPPDATA%\Android\Sdk\platform-tools

Execute the commands with the adb

  • For Android Q and…

--

--

Published in Dev Genius

Coding, Tutorials, News, UX, UI and much more related to development

Written by Kidd Tang

Full-stack web developer with electronic engineering background.

No responses yet

Write a response