Bypassing SSL pinning

Many times, you will not be able to intercept an application's HTTPS traffic, even after installing Burp Suite CA certificate on the device. Nowadays, many applications implement SSL pinning, where an application checks the server's certificate against a known copy of that certificate. This prevents the usage of any untrusted certificate that is being used for man-in-the-middle (MITM) attacks.

You can bypass SSL pinning by using tools such as SSL Kill Switch. However, note that this is available only for jailbroken devices. I would encourage you to go further and study from its wiki on how it helps in bypassing SSL verification.

It comes as a Debian package and once you install it on iDevice, you will need to enable the switch, ...

Get Learning iOS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.