With friTap
First, you need to set up Root access to AVD and make sure you have allocated enough RAM for the virtual device.
Then, install friTap with pipx
and follow https://fkie-cad.github.io/friTap/platforms/android/ to install frida-server
on your emulator.
You should then find the specific app you want to analyze.
# List all installed packages
adb shell pm list packages
# Search for specific app
adb shell pm list packages | grep instagram
# Get package details
adb shell dumpsys package com.instagram.android | grep version
and use these commands to extract TLS keys or decrypted PCAP file. Use -v
to show errors otherwise hidden from command output, and also add -do
if it’s not enough.
# Extract TLS keys from Android app
fritap -m -k instagram_keys.log com.instagram.android
# Capture decrypted traffic
fritap -m --pcap instagram_traffic.pcap com.instagram.android
# Spawn app from beginning
fritap -m -s -k keys.log com.example.app
# Verbose analysis with debug output
fritap -m -v -k keys.log -do com.example.app
If --pcap
is not working, or that you prefer capturing PCAP directly via adb
and tcpdump
, use
adb exec-out "tcpdump -U -w - 2>/dev/null" | wireshark -k -S -i -
to stream the captured packets live and set the (Pre)-Master-Secret log file to instagram_keys.log
in Wireshark preferences Protocols → TLS. Replace the filename instagram_keys.log
as needed.