AES-Killer v3.0 – Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps On The Fly

Burpsuite Plugin to decrypt AES Encrypted traffic on the fly.RequirementsBurpsuiteJavaTested onBurpsuite 1.7.36Windows 10xubuntu 18.04Kali Linux 2018What it doesThe IProxyListener decrypt requests and encrypt responses, and an IHttpListener than encrypt requests and decrypt responses.Burp sees the decrypted traffic, including Repeater, Intruder and Scanner, but the client/mobile app and server see the encrypted version.NOTE: Currently support AES/CBC/PKCS5Padding encryption/decryption.How it worksRequire AES Encryption Key (Can be obtained by using frida script or reversing mobile app)Require AES Encryption Initialize Vector (Can be obtained by using frida script or reversing mobile app)Request Parameter (Leave blank in case of whole request body)Response Parameter (Leave blank in case of whole response body)Character Separated with space for obfuscation on request/response (In case of Offuscation)URL/Host of target to decrypt/encrypt request and responseHow to InstallDownload jar file from Release and add in burpsuiteOriginal Request/ResponseGetting AES Encryption Key and IVFirst setup frida server on IOS and Android device.Launch Application on mobile device.Run this frida script on your host machine to get AES Encryption Key and IV.Decrypt Request/ResponseProvide SecretSpecKey under Secret Key fieldProcide IV under Initialize Vector fieldProvide Host/URL to filter request and response for encryption and decryptionPress Start AES KillerDownload AES-Killer