Android Pentesting Setup
A proper Android pentesting environment takes about an hour to set up correctly. This guide walks through everything: emulator vs physical device, ADB, Burp Suite proxy configuration, cert installation, and the core toolchain you’ll use on every engagement.
Device Options
Rooted Physical Device
Pros: Real hardware, real cellular stack, actual sensor data, performance.
Cons: Requires a device with an unlockable bootloader (Pixel is the standard choice), risk of bricking, warranty void.
Best device: Google Pixel (any generation) — easiest bootloader unlock, good Magisk support.
Android Emulator (Recommended for Starting Out)
Option 1: Android Studio AVD (no root)
Good for non-root testing. Supports API interception but no Magisk.
Option 2: Genymotion
Fast x86 emulation, easy to reset to snapshots, root available.
Option 3: AVD with AOSP image (best for root)
|
ADB Setup
|
Burp Suite Proxy Setup
Step 1 — Configure Burp listener
In Burp → Proxy → Options → Add a listener on 0.0.0.0:8080.
Step 2 — Configure device proxy
On the Android device/emulator:
|
For emulator via ADB:
|
Step 3 — Install Burp CA Certificate
Android ≤ 6 (API ≤ 23): User certs are trusted by apps by default.
Android 7+ (API 24+): Apps must explicitly opt in to user certificates.
System cert installation (requires root):
|
Magisk module alternative: MagiskTrustUserCerts — automatically moves user certs to system store.
Core Tools
Frida
Dynamic instrumentation framework — hook Java methods, bypass SSL pinning, modify runtime behavior.
|
Objection
Runtime mobile exploration — wraps Frida for easy use.
|
jadx
Decompile APK to readable Java.
|
apktool
Decompile, modify, recompile APKs.
|
MobSF
Automated mobile security assessment.
|
drozer
Android security assessment framework.
|
Network Traffic Analysis
HTTP traffic — Burp Suite (see above)
Non-HTTP traffic
|
gRPC / Protobuf
|
Emulator Detection Bypass
Some apps detect emulators and refuse to run. Quick bypass:
|
Environment Checklist
- Rooted device or AOSP emulator
- ADB installed and
adb devicesshows device - Burp listener on 0.0.0.0:8080
- Device proxy pointing to Burp
- Burp CA cert in system trust store
- Frida server running on device
- jadx, apktool, MobSF installed
- Objection installed and working
- Can intercept HTTPS traffic in Burp
Discussion
Leave a comment · All fields required · No spam
No comments yet. Be the first.