Network Payload Capture - Setup for Android device

Step 1: Setting in Portal

  • Go to Portal page → User → Settings → Network Capturing tab 

  • Here, enter the domain name(s) that you wish to capture separated by whitespace or comma.dJQOS8dFZQ4kQWdZ2bHm9MITY8oVhBiA5IC4Cyd54tln62oY4xJHnZjkzQXVE25U0KQhcrsxPLTXmXP780WFC_qwqYoBDX_pV5h3uI_rVpVNAMWqN3aB8v5QNYb59_D58qD0JkEe.png

  • Moreover, click on the Advanced settings. Here, you can choose data types that you want to capture in your requests/responses by turning them on using toggle buttons. y5Zn9YLm85ptyG3T1lNe-4gICP4Bw9MDQWIheARGLn3f5H2xkczbunnvvTvxKTDCPZJi8GFxw6aUXPGwUTvAR0ORtDQzRhPC9bUtUjCwwmQ1nOYmD5G2hoMvMbIyRRPtGM7UB2pJ.png

  • Click Apply. 

Step 2: Obtain device's UDID

  • You can get the UDID value in the IMEI/IMSI/MEID field in the phone status setting (Go to device's Settings > About Phone > Status)

  • Alternatively, you can plug the device into a computer and obtain it through Terminal YPJ2bRBKlEqt61-SPGV4jQDcAvSebl6obp2w43ImPcuSYU4pou84JGj6EJFJrxWZrPNDDSbhM_-RfT185Wsp1rYbNdZcpAisv_TdU5lBBu9KigQqsxamHExQu6VKKzT94rq-C2ij.png

 

Step 3: Install Kobiton Certificate: 

First, download Kobiton certificate for Network Payload Capture (NPC):

For setting up NPC for devices on Latest Kobiton platform, download this certificate: shorturl.at/fLNR1

For setting up NPC for devices on Legacy Kobiton platform, download this certificate: shorturl.at/ans68

  1. Method 1: Install the Android File Transfer app onto a macOS system that an Android device is plugged directly into. (This app is currently not available in the macOS App Store. Obtain it by download from Android File Transfer site.) Pull the certificate file to the macOS file system; then use the Android File Transfer app to copy it onto the device (where it will usually show up in a standard “Downloads” folder).

  2. Method 2: Make sure that your device is connected to your machine
    Step 1: Download the certificate on your laptop
    Step 2: Run this command in terminal:

1adb push 'path-to-your-downloaded-certificate' 'sdcard’

 

'path-to-your-downloaded-certificate' is the path of this certificate that was downloaded to your laptop and ‘sdcard’ is the folder of the device that this certificate will be copied to.

For example: adb push '/Users/$(whoami)/Downloads/mitmproxy-cert.crt' 'sdcard'

eueqnGf3cyt15sAbnpQFBxpUgnbR8GR1ojB8q7sPlykV2LBme-PKwZ4YFvKKmoO5JEKX4LGzeeqgAtr9nJAmLtztzw9yk4pA5PTu3BrdIZGirBZEYf6Hx5lKFhSxaeO86wLsjHAV.png

 

Step 4: Setup Kobiton Certificate in device

For Android 10 or below

  • Go Settings → Storage → Explore and Kobiton Certificate is shown here. Click on this Certificate file. Next, we need to set up a passcode (pin/password) for the device.

  • image-20211129-042551.png

  • If the device has already set up a passcode:

    A pop-up message will ask you to input the device passcode. After bypassing the passcode, enter the certificate name and tap the OK button. The certificate will be installed. 
  • If the device hasn't got a passcode:
    • Input the Certificate Name then select OK. gVoyXw0naDsSwNKu22oPTrlqldyIBtvsQ7TnTvcwKKwHbDDpaA8BDC1SjGkBi_gApt57xCKGF_OfIx5rvld3nLrJnSngngwL4R7QBBetuh7UHJ889NunLskW6emA_O4jyvPw3kBs.png
    • A pop-up message will ask you to set a lock screen PIN or password before you move further. Select OK.

              jNw-fX6XLpvzVuv48EXSiDKsslSExaAzV0olRq6T23j4fe_t4Bj9dBdlab9Wobqo1lIP7BscuxG13twlR3H-EcotkYeifwnJ1Gw7D3GYDUGEZ5uTXpTSORQd0qMSOmHmuGZQs_Sa.png

    • Choose any option you want to use to set up a lock screen including Pattern, PIN, Password,... After finishing setting up the passcode, the certificate will be installed. image-20211129-064354.png

For Android 11 or later

Go to Settings → Biometrics and security → Other security settings -> Install from the device storage → CA certificate → a warning message appears, click on “Install anyway” button → Select certificate in Internal storage. After doing these steps, this certificate is installed. image-20211129-071309.png

image-20211129-071442.png

 

Step 5: Remove your created passcode before moving further

Go to Settings → Security → Screen lock → Input your PIN → choose screen lock: None → a pop-up will appear, choose “Yes, remove” to delete all passcode.

image-20211130-034503.pngimage-20211130-034538.png

 

Step 6: Download Apple Configuration 2 in AppStore

  • Do not plug the device.

  • Go to the AppStore or follow the link here to download the Apple Configurator 2 application.

  • Open Apple Configurator 2.

  • In Apple Configurator 2 on the top of your screen, Click on choose Install Automation Tools in the Apple Configurator 2 menu, click on Install, then enter your administrator password. nO7g9eUAXjztpu00MZ-tXidab2Crtpi8JUgpl61mV7WyeAhyZSAeWaHte25qS8iFNVXsAVq-FEaF-EJDCvQA0QGn4QPw-dePkB3UIi67M0yF_sgflXJxe_sp6TnxX7uxTHFQRJkS.png

 

Step 7: Add the config file

  • Make sure the device is not plugged into the computer and do not start Kobiton Desktop App yet. 

  • Go to the path below (In other to get the device UDID, please see step 2).

/Users/$(whoami)/Library/Application Support/Kobiton/devices/your-device-udid

CLs5d86N2t0FSo3zaKyG9wKlYHCuZ9_M58vShBOc4q-ZMCHQZwlyFt5m-CpQEnZQj5xzAk2PhZIYMG9J5TLJCvPfQk5rc0u2BR42bQ6t2lgciZr9dL5yHjoAu7huRBtZaA89LODu.png

  • Create a file named config in this folder with the content below. Otherwise, download the config file here.

{"unlockPasscodeEnabled": false, "networkPayloadCaptureEnabled": true}
 
image-20211129-073659.png

Step 8: Do the Network Payload capture testing on the device

  • Make sure that the mobile device and the computer where it is plugged connect to the same Wifi/Ethernet address.

  • With the mobile device plugged in, launch the Kobiton Desktop application.

  • Make sure that the Apple configurator tool is started and running during the test for Android devices.

  • Start your test session including Manual (or Appium automation) that accesses the domain which is set up to capture payload. 

  • You can view the payload in the tab Observe Request / Response Payloads in Session Detail page on the Kobiton portal. QzTwnlZsPjr2_IvpI_K7c7cuL-onRwuGT0dpXQKnJa3MdGU4HpBoTmPkEbacjhKQaWHNl59FfuoogCKwdt6ee8uPJ294ZrT8osFYcRcR-qIEYWkLeKLsCNf97C61RkT-wzLWiU6A.png

Was this article helpful?
0 out of 0 found this helpful