Good stuff. You might find more interesting data by implementing Frida [0] into your process to snoop on encrypted traffic normally not visible due to pinned certificates.
Good stuff. You might find more interesting data by implementing Frida [0] into your process to snoop on encrypted traffic normally not visible due to pinned certificates.
And more specifically just use the maintained scripts from HTTP Toolkit.
https://github.com/httptoolkit/frida-interception-and-unpinn...
Excellent, thank you. There’s a lot to Frida.
HTTP Toolkit only mentions using jailbroken iOS devices, but you can also use unjailbroken devices running v13+ via injection [0]
[0] https://frida.re/docs/ios/