kakaotalk_analysis/scripts/mitmproxy
2023-10-06 15:02:18 +02:00
..
lib Update loco_parser.py 2023-10-06 15:02:18 +02:00
tests Add tests 2023-09-06 20:51:55 +02:00
cfb_test.py Add CFB test script 2023-09-06 20:52:35 +02:00
loco_mitm.py Add more add-ons 2023-10-06 14:59:15 +02:00
pyproject.toml Add tests 2023-09-06 20:51:55 +02:00
README.md Add scripts 2023-05-09 21:58:23 +02:00

MITM Kakaotalk LOCO Packets

This is a simple script to man-in-the-middle LOCO packets with mitmproxy.

Setup on your MITM host:

$ python3 -m venv venv
$ source venv/bin/activate
(venv) $ python3 -m pip install mitmproxy bson cryptography
(venv) $ mitmdump --mode wireguard --rawtcp -s loco_mitm.py

Android emulator setup:

  • Install the Kakaotalk app if not done already
  • Install the WireGuard app
  • Change the IP address in mitmproxy's generated WireGuard config to 10.0.2.2. Example:
[Interface]
PrivateKey = MCCAFVMZQk+k+sbdXx0B4LG+Mij/UO7qyWa7IRqv/nA=
Address = 10.0.0.1/32
DNS = 10.0.0.53

[Peer]
PublicKey = K+t/qiGO8tlA9L7wjAOb8wqjnu/NuthHgLs2gOCIDgY=
AllowedIPs = 0.0.0.0/0
Endpoint = 10.0.2.2:51820
  • Import the config in the WireGuard app

Back on your MITM host start Frida (see setup instructions):

$ frida -U -l loco-tracer.js -f com.kakao.talk