diff --git a/techniques/android/MASTG-TECH-0109.md b/techniques/android/MASTG-TECH-0109.md index aef1a0ef9a..a010246940 100644 --- a/techniques/android/MASTG-TECH-0109.md +++ b/techniques/android/MASTG-TECH-0109.md @@ -87,7 +87,7 @@ There are generally two approaches to this: **@MASTG-TOOL-0100** and **@MASTG-TO ## Intercepting Traffic using HTTP Toolkit -If the above methods don't work, you can try using HTTP Toolkit, which provides another way to intercept Flutter HTTPS traffic. +If the above methods don't work, you can try using @MASTG-TOOL-0112, which provides another way to intercept Flutter HTTPS traffic. 1. **Install HTTP Toolkit** - You can download it from [here](https://httptoolkit.com/). diff --git a/tools/network/MASTG-TOOL-0112.md b/tools/network/MASTG-TOOL-0112.md new file mode 100644 index 0000000000..800acb37ad --- /dev/null +++ b/tools/network/MASTG-TOOL-0112.md @@ -0,0 +1,9 @@ +--- +title: HTTP Toolkit +platform: network +source: https://httptoolkit.com +--- + +[HTTP Toolkit](https://httptoolkit.com/) is an open-source tool designed to intercept, analyze, and debug HTTPS traffic. The tool captures HTTP traffic from Android, iOS, web or desktop applications. It provides functionalities such as complete decryption of HTTPS traffic, real-time monitoring of requests and responses, the ability to simulate HTTP requests, and automated interception of HTTP requests with minimal configuration required. + +It is designed to work across various platforms and integrates smoothly with browsers and devices, by automatically setting up its CA certificate and disabling SSL pinning via Frida, to optimize traffic analysis.