In order to capture the HTTP/HTTPS message in physical Android Devices or Android Emulators, please navigate to:
Certificate Menu -> Install Certificate on Android -> Device
Certificate Menu -> Install Certificate on Android -> Emulator
Check out the Mini Tutorial on how to set up on Android devices & emulators​
For the Android Emulator, let check out the Automatic Script for Android Emulator​
The following photo describes thee steps:
Install Root Proxyman Certificate on your machine: You can follow the macOS Guide.
Config the HTTP Proxy on your device: You can find it in Setting app -> Wifi -> Select the current Wifi -> Config the HTTP Proxy by following the next tables.
Name | Value |
Server IP | Your current IP Network |
Port | The current port of Proxyman: 9090 is the default |
Authentication | No |
Some Samsung devices couldn't access the Internet after setting the HTTP Proxy. Please try to forget your current network and connect again.
If you're using any VPN app, please make sure to close it, since some VPN apps conflict with HTTPS Proxy config
3. Open http://proxy.man/ssl from the native web browser on your Android Devices in order to install the Proxyman Certificate.
Please make sure to install the Certificate and select the VPN and App Section.
If you're using Android API 30+, please follow the guideline to trust CA Proxyman Certificate​
http://proxy.man/ssl is a local website, which serves from the local Proxyman's HTTP server. If you couldn't open it, please forget the wifi, re-connect and make sure the Proxyman app is opening.
If you couldn't access it. Please open the support ticket at Github's repo.
4. From Android N, we have to trust the Proxyman Certificate in your app by adding the following code: It means that you can only use SSL Proxying in apps, which you are in control
Add res/xml/network_security_config.xml
network_security_config.xml<network-security-config><debug-overrides><trust-anchors><!-- Trust user added CAs while debuggable only --><certificates src="user" /><certificates src="system" /></trust-anchors></debug-overrides><base-config cleartextTrafficPermitted="true"><trust-anchors><certificates src="system" /></trust-anchors></base-config>​<domain-config><!-- Make sure your URL Server here --><domain includeSubdomains="true">your_production_domain</domain><trust-anchors><certificates src="user"/><certificates src="system"/></trust-anchors></domain-config></network-security-config>
Make sure you replace your_production_domain with your real domains that you're going to intercept.
Add to AndroidManifest.xml
manifest.xml<?xml version="1.0" encoding="utf-8"?><manifest ... ><application android:networkSecurityConfig="@xml/network_security_config" ... >...</application></manifest>
Find more information at Network Security Configuration ​
Make sure that you remove those configs in the Release build. If not, your HTTP/HTTPS requests can be intercepted and leak your sensitive data in the Production build.
5. If it's Android Emulator, please restart the emulator
6. Try to open your app, and intercept your domain, which is added on the network_security_config.xml
Please check out this troubleshooting section.​
If you've struggled to config XML settings, let check out this simple project that we've configured:
Some Android apps have embedded WebView that requires extra steps in order to intercept the HTTPS traffic.
Make sure you're able to see other HTTPS traffic from your Android app. It means that you've set up the certificate properly
Inject the following code to your WebView
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.KITKAT) {WebView.setWebContentsDebuggingEnabled(true);}​// The following two lines help with disabling asset cachingwebView.getSettings().setAppCacheEnabled(false);webView.getSettings().setCacheMode(WebSettings.LOAD_NO_CACHE);
3. Open a new Chrome tab on your computer and navigate to chrome://inspect
4. When you open the WebView, the view will appear in your Chrome tab, then you can simply click inspect
to start using the remote debugger.
Credit for Shirshak​
If your Android version is below 7 you don't need to do this step. Google added extra security that doesn't allow man-in-middle-app to attack after Android 6. i.e unable to do MITM attack to android apps.
We don't bear any responsibility for problems due to rooting phones. So please follow the guide at your own risk.
Root your phone with magisk framework.
Install the Root file browser so you can copy and paste files in a restricted system folder.
Type the following script in the command line
$ cd ~/.proxyman// We copy certificate to another file name just so we may need it later$ cp proxyman-ca.pem temp.pem$ hash=$(openssl x509 -inform PEM -subject_hash_old -in temp.pem | head -1)$ mv temp.pem "$hash.0"
If you go to ~/.proxyman
folder you must notice a file name starting with numbers with extension
Copy that file to your Andriod.
Using root file browser transfer that file to /system/etc/security/cacerts/
Enjoy proxying.
When using Andriod phones, set gateway to any wrong IP just so you can be sure all your traffic goes from proxy man proxy only.
We can use the macOS sharing feature to create a mobile hotspot. And from an android phone, you can use Proxyman proxy easily. It is much better because sometimes the router can block requests between mobile and macOS.
Mitmproxy has a useful tutorial on how to install Certificate on Android Emulator: https://docs.mitmproxy.org/stable/howto-install-system-trusted-ca-android/​