Intercepting FireTV traffic using Burpsuite

 If you need to intercept Amazon FireTV traffic over Burpsuite, just follow these steps:

1. Create a new cert from Burp

2. Convert the cert to a pem file.

openssl x509 -inform der -in cacert.der -out cacert.pem

3. Push the cert to the device

adb push cacert.pem /storage/emulated/0/Download

4. Install the cert

adb shell am start -a "android.intent.action.VIEW" -d "file:///storage/emulated/0/Download/cacert.pem" -t "application/x-x509-ca-cert"

• Note at this time Amazon fire stick will prompt you to login to your Amazon Account, things may not working properly i.e. the typing stuff etc, so use SCRCPY to navigate the screens on your laptop.

5. Enable the proxy by using this view. 

adb shell am start -n com.amazon.ssm/.ControlPanel

Thank you - hope this post is helpful.

Comments

I am pleased that this article provided me with some important information. Thank you so much for sharing it. Keep up the good work. Amazon Fire Stick Not Registering
Rockgeek said…
This kinda worked until the end. It prompts for the username/password, I press ok, and it says the certificate can't be installed, without allowing me to do anything

Popular posts from this blog

The correct way to install Jython (for Burpsuite)

RFID cloning with Proxmark3 Easy

Extracting an IPA; App distributed through Testflight