In this blog post we will introduce WebUSB Unpinner, an open-source Web application that makes Android network analysis more accessible by leveraging WebUSB.
We will explain how to bootstrap the application, which kind of security measures it can bypass and how to better understand its components to benefit as much as possible from this tool.
One of the key aspects of WebUSB Unpinner is that it does not require to install any additional tool on the user premises, or to compromise the security of the user device, and it does not require any previous knowledge of Android reverse engineering techniques to be used at its best.
*Only if you’re using an Android device with ADB enabled and a running instance of an HTTPS proxy
which expands the group of people that can do this from mobile cybersec people to anybody with some foundations of IT management skills