I'm currently trying to intercept API calls of an IOS App.
Why? I want to reverse engineer their private API and use it for more specific requests.
However, the App has nearly zero https
traffic and traffic via web sockets.
The only requests they have sent during the start of the app were on to:
fcmtoken
for Cloud MessagingThus, I was wondering how they fetch the data displaying in the app.
After some more deep research and reverse engineering the android app, I noticed that the app uses flutter. The problem with that is that Flutter uses Dart and Dart is not proxy aware and uses its own certificate store. Hence, the application doesn't take any proxy settings from the system and sends data directly to the server. Thus, I wasn't able to intercept the request using Burpsuite.
I was able to intercept the firebase and mapbox requests as they were imported as nodejs packages.