2. Sniffing HTTP/HTTPS Traffic on AVD (Android emulator)

Sometimes it may happen that you might need to use AVD (Android Virtual Device) / emulator to intercept App Traffic. Earlier virtual device were not having WiFi interface, so you you need to rely upon command line to use it for API Interception (Newer ones you can have WiFi so you can use it directly like a phone to forward proxy).


First of all go to Tools directory C:\Users\<YourUserName>\AppData\Local\Android\sdk\tools (Windows)   OR /Users/<YourUserName>/Library/Android/sdk/tools (Macintosh)


Step:1 First Obtain names of AVD created using below command

emaulator -list-avds     (Windows) OR

./emulator -list-avds    (Mac/Linux)


Step:2 Launching above emulator with proxy IP & Port of laptop

Syntax: emulator -avd AVD_NAME -http-proxy http://LAPTOP_IPADDRESS:PORT


emulator -avd Nexus_5X_API23 -http-proxy



./emulator -avd Nexus_5X_API23 -http-proxy



This would start AVD by default with HTTP & HTTPS traffic being forwarded to laptop IP:Port Combination we had mentioned. Remember you also need to add proxy certificate in case you haven’t already, refer previous article to understand how to add Proxy certificate & configure burp proxy listener. If you are using device running Android 7.0 or higher read – intercepting HTTPS on Android 7.0 Nougat or newer.

Report Errors + Bugs & Become Insider for Nestedif.com

We would like to hear you, if you find any error or misspelled phrase while reading our tutorials. By reporting mistakes through email to insider@nestedif.com you could help other peers.