Description
Running Marshmallow 6.0.1 (MMB29K) on Nexus 5X.
MITM attacks are successful on some of the targets (Win10 laptop on wifi). However, session hijacking caused the target to be unable to load the site.
Ineffective on Lollipop (HTC One M9 & Samsung Galaxy S4) targets. Redirect does not work. Crashes on some occasions. Session hijacking always results in a crash.
EDIT:
errorlog for crash which occured when redirecting another Lollipop target
javax.net.ssl.SSLHandshakeException: Handshake failed
at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:396)
at com.android.org.conscrypt.OpenSSLSocketImpl.waitForHandshake(OpenSSLSocketImpl.java:629)
at com.android.org.conscrypt.OpenSSLSocketImpl.getInputStream(OpenSSLSocketImpl.java:591)
at org.csploit.android.net.http.proxy.HTTPSRedirector$1.run(HTTPSRedirector.java:118)
at java.lang.Thread.run(Thread.java:818)
Caused by: javax.net.ssl.SSLProtocolException: SSL handshake terminated: ssl=0xdf1f2800: Failure in SSL library, usually a protocol error
error:100c5416:SSL routines:ssl3_read_bytes:SSLV3_ALERT_CERTIFICATE_UNKNOWN (external/boringssl/src/ssl/s3_pkt.c:972 0xda948240:0x00000001)
at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method)
at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:324)
... 4 more