

The just drop into a shell ( adb shell) and move the file to /system/etc/security/cacerts and chmod it to 644: mv /sdcard/9a5ba575.0 /system/etc/security/cacerts/ chmod 644 /system/etc/security/cacerts/9a5ba575.0 # for this -writable-system is IMP adb root adb remount adb push 9a5ba575.0 /sdcard/ emulator -avd Pixel2 - writable-system. #output hash value mv cacert.pem 9a5ba575.0 # change nameĬopy the certificate to the device We can use adb to copy the certificate over, but since it has to be copied to the /system filesystem, we have to remount it as writable. Use openssl to convert DER to PEM, then output the subject_hash_old and rename the file: openssl x509 -inform DER -in r -out cacert.pem openssl x509 -inform PEM -subject_hash_old -in cacert.pem | head -1 9a5ba575.

Android Studio Bumblebee 2021.1.1 Patch 3Īfter installation Open Andriod Studio and create One deviceĪndroid wants the certificate to be in PEM format, and to have the filename equal to the subject_hash_old value appended with.

for installation you can refer any Youtube video its Simple. Download latest Andriod studio from their Official Site. Andriod Studio have their virtual devices.

After some research i found better way than Gennymotionįor Emulator i Choose Andriod Studio. And Gennymotion has dependency of virtualbox. M1 chips doesn’t support virtulization so there is no Virtualbox. recently i moved to Macbook m1 for my full time pentesting. also in Flutter based apps they have inbuit security for ssl pinning. after using it sometime i noticed its x-86 based Architecture so we cant test x-64 based Architecture Apps. when i Started learning Andriod Pentesting i refer some videos And Blogs on internet everyone suggesting Genymotion emulator. As we know for Andriod pentesting we need Physical device or emulator.
