{"id":812,"date":"2013-05-04T16:30:53","date_gmt":"2013-05-04T15:30:53","guid":{"rendered":"http:\/\/emtunc.org\/blog\/?p=812"},"modified":"2013-06-15T13:03:28","modified_gmt":"2013-06-15T12:03:28","slug":"tampering-with-mobile-traffic-using-fiddler","status":"publish","type":"post","link":"https:\/\/emtunc.org\/blog\/05\/2013\/tampering-with-mobile-traffic-using-fiddler\/","title":{"rendered":"Tampering with Mobile Traffic Using Fiddler"},"content":{"rendered":"<p>In <a title=\"Capturing Mobile Traffic Using Fiddler\" href=\"http:\/\/emtunc.org\/blog\/04\/2013\/capturing-mobile-traffic-using-fiddler\/\" target=\"_blank\">part one<\/a> of these series I talked about how you can very easily <a title=\"Capturing Mobile Traffic Using Fiddler\" href=\"http:\/\/emtunc.org\/blog\/04\/2013\/capturing-mobile-traffic-using-fiddler\/\" target=\"_blank\">capture mobile traffic using Fiddler<\/a>.<\/p>\n<p>In this second part, I will talk about how you can actually tamper with the traffic you send <strong>and<\/strong> receive to and from your mobile device.<br \/>\nPlease note that tampering with traffic is not just limited to mobile traffic!<\/p>\n<p><!--more--><\/p>\n<p>Whether you are a developer, penetration tester or just curious (I fit in to the latter category :)), being able to tamper with your requests and responses will give you a better insight in to what can be done with an application, how it will respond to specific input against what is expected, etc.<\/p>\n<p>Assuming you have followed the <a title=\"Capturing Mobile Traffic Using Fiddler\" href=\"http:\/\/emtunc.org\/blog\/04\/2013\/capturing-mobile-traffic-using-fiddler\/\" target=\"_blank\">first part of this series<\/a>, tampering with the requests and responses is fairly simple.<\/p>\n<p><span style=\"text-decoration: underline;\">Breakpointing all requests and responses<\/span><\/p>\n<p>Go to the &#8216;<em>Rules<\/em>&#8216; tab at the top and select &#8216;<em>Automatic Breakpoints<\/em>&#8216;. Now either select &#8216;<em>Before Requests<\/em>&#8216; or &#8216;<em>After Responses<\/em>&#8216;.<\/p>\n<p>Before requests means you can edit the request before it is sent to the server. You can also edit the response back to the client if you wish. I will show this later down.<\/p>\n<p>After responses means you edit only what is sent back to the client.<\/p>\n<p><span style=\"text-decoration: underline;\">Breakpointing a certain request<\/span><\/p>\n<p>If you want to break point a certain request, for example POST requests sent to http:\/\/www.example.org\/login, simply type <em>bpu http:\/\/www.examle.org\/login<\/em> in to the little console bar like below:<\/p>\n<figure id=\"attachment_814\" aria-describedby=\"caption-attachment-814\" style=\"width: 1057px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/04\/fiddler_consolebar.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-814\" alt=\"Fiddler Console Bar\" src=\"https:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/04\/fiddler_consolebar.png\" width=\"1057\" height=\"328\" srcset=\"https:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/04\/fiddler_consolebar.png 1057w, https:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/04\/fiddler_consolebar-300x93.png 300w, https:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/04\/fiddler_consolebar-1024x317.png 1024w\" sizes=\"auto, (max-width: 1057px) 100vw, 1057px\" \/><\/a><figcaption id=\"caption-attachment-814\" class=\"wp-caption-text\">Fiddler Console Bar<\/figcaption><\/figure>\n<p>Alternatively, if the request you want to breakpoint is already in the Fiddler window, just select it, type <em>bpu<\/em> then press CTRL+i and the URL will be autofilled for you.<\/p>\n<p>When a breakpoint is hit, you will see a window like the below.<\/p>\n<figure id=\"attachment_820\" aria-describedby=\"caption-attachment-820\" style=\"width: 820px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/05\/breakpoint_tamper.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-820\" alt=\"Hitting a breakpoint in Fiddler\" src=\"http:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/05\/breakpoint_tamper.png\" width=\"820\" height=\"364\" srcset=\"https:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/05\/breakpoint_tamper.png 820w, https:\/\/emtunc.org\/blog\/wp-content\/uploads\/2013\/05\/breakpoint_tamper-300x133.png 300w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/a><figcaption id=\"caption-attachment-820\" class=\"wp-caption-text\">Hitting a breakpoint in Fiddler<\/figcaption><\/figure>\n<p>When you hit the breakpoint, you can tamper the request (the top pane).<br \/>\nWhen you are done, hit <em>Break on Response<\/em> to tamper the request back to the client (the bottom pane) or click <em>Run to Completion<\/em> to just tamper the request and not the response.<em><\/em><\/p>\n<p>There is a <strong>lot<\/strong> you can do with Fiddler and this is only touching the surface.<br \/>\nHope you found this short article useful.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In part one of these series I talked about how you can very easily capture mobile traffic using Fiddler. In this second part, I will talk about how you can actually tamper with the traffic you send and receive to and from your mobile device. Please note that tampering with traffic is not just limited [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1],"tags":[101,108],"class_list":["post-812","post","type-post","status-publish","format-standard","hentry","category-tech","tag-fiddler","tag-tampering"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1trTO-d6","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/comments?post=812"}],"version-history":[{"count":9,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/812\/revisions"}],"predecessor-version":[{"id":885,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/812\/revisions\/885"}],"wp:attachment":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/media?parent=812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/categories?post=812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/tags?post=812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}