Intercepting HTTP traffic in Flutter apps has attracted significant interest among security researchers. Tools like reflutter have simplified this process. However, these tools often rely on hard-coded HTTP ports, which can limit flexibility in some cases.

This guide outlines a straightforward approach for analyzing Android Flutter apps without the need to rely on specific, fixed ports.


Required Tools

To intercept HTTP traffic in Flutter apps, you will need the following tools:

  • Frida: A dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
  • Frida APK Patcher: A tool to patch APKs for Frida compatibility.
  • ProxyMe: A proxy tool for easier traffic routing.
  • Burp Suite: A powerful tool for web application security testing.

Steps to Intercept Traffic

  1. Patch the APK with Frida APK Patcher

    • Use frida-apk-patcher to modify the APK, allowing Frida instrumentation.
  2. Set Up Burp Suite Proxy

    • Configure Burp Suite to act as the proxy for HTTP and HTTPS traffic.
  3. Install and Set Up ProxyMe

    • ProxyMe facilitates the routing of app traffic through Burp Suite.
    • Refer to the ProxyMe documentation for installation instructions.
  4. Intercept Traffic

frida -U Gadget -l disable-flutter-tls.js
  • Launch BurpSuite and set up the proxy listener on the desired port.
  • Open the app on the Android device and observe the HTTP traffic in Burp Suite.