-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Does scapception still work?!? #13
Comments
I'd assume so, since this just uses mitmproxy and a separate CA installed on the client, so as long as Snapchat still uses the device's CA stores, it should still work. I'm testing now. |
Did you get it to work? |
Unfortunately, I couldn't. Looks like there's a conflict between the version of click (easy command-line interfaces) that mitmproxy needs and the version that snapception uses (older). Also, I took a look through the code, and it looks like it decrypts pictures using a single key, which is part of the old Snapchat security system, so the main idea probably wouldn't work anyways. If you're still trying to view Snapchat traffic, I recommend installing and using mitmproxy by itself (it comes with a web interface). You'll need to install the mitmproxy certificate on your device once you've connected to the proxy, and then probably bypass Snapchat's certificate pinning (probably easiest on Android since they have an easy debugger) as well. Good luck! |
Well I found alternate way to get Key and IV, however neither openssl (gets error reading input file), or if you were to follow https://gibsonsec.org/snapchat/fulldisclosure/#encrypting-stories neither python thanks to lack of mcrypt, there isn't much documentation or ways to decrypt it. There suddenly isn't a way to decrypt it. And this project doesn't decrypt story snaps (sometimes stories are encrypted, sometimes they aren't. Often are for public, like celebrities or friend who didn't add you). Then again often snapchat is used to leak nudes or whatever else, there are some legit use cases, and some which aren't. But i'd prefer limited availability rather than letting everyone abuse it But as of time of writing, snaps from user a to b, both videos and images are unencrypted, and chat content (like pictures, voice clips, etc) are not encrypted as well. |
I couldn’t get this working either. Is there a way to intercept just text/chat messages? I played around with mitmproxy but couldn’t get it to even connect reliably, and snapception wont install under any platform I’ve tried. |
Thanks guys for the refrences, Can i use the ssl certificate to sniff the network for logins to snapchat servers? |
I have spent the past few days trying to preform a MitM with snap using frida and a proxy. No luck, snapchat seems to have heavy obfuscation. I'm just trying to discover endpoints if anyone has any information on how to do that it would be much appreciated. |
Any luck? |
I found all of the endpoints using Charles Proxy and SSL Killswitch on my iPhone. The AES-128 encryption key must've changed though. Can't decrypt snaps using the script. |
We probably need to dump the executable and dig through it with IDA, although they might have obfuscated it a bit better than that |
I'm currently using some runtime exploits to hopefully find something. |
That sounds super interesting, would you be able to elaborate? |
Sure thing! Here’s my setup for analyzing and performing MITM actions to the Snapchat App:
Here’s some links to some apps and resources I used here:
What I’m hoping to do next is find out how to override the certificate pinning and jailbreak detection on the latest versions and then repackage this into an IPA that can be installed on a Jailed device, without getting it banned. |
Do it still work?
The text was updated successfully, but these errors were encountered: