<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>MITM - Mobile Exploits on Florence Njeri</title><link>https://florence-njeri.github.io/njeri/tags/mitm-mobile-exploits/</link><description>Recent content in MITM - Mobile Exploits on Florence Njeri</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Wed, 04 Feb 2026 09:00:00 +0000</lastBuildDate><atom:link href="https://florence-njeri.github.io/njeri/tags/mitm-mobile-exploits/index.xml" rel="self" type="application/rss+xml"/><item><title>8kSec - Factsdroid WriteUp</title><link>https://florence-njeri.github.io/njeri/posts/factsdroid/</link><pubDate>Wed, 04 Feb 2026 09:00:00 +0000</pubDate><guid>https://florence-njeri.github.io/njeri/posts/factsdroid/</guid><description>GOAL: Intercept network traffic in FactsDroid and view/modify the API requests and responses between FactsDroid and the backend server without statically patching the provided APK. The objective is to successfully implement a Man-in-The-Middle (MITM) attack that allows you to manipulate the facts being displayed to the user, potentially inserting custom content or modifying the retrieved facts before they reach the application.
Upon installing the app using adb install factsdroid.apk, I immediately see this error message when launching the app: In order to bypass the root check, I injected the Frida anti-root script into my APK:
frida -U --codeshare dzonerzy/fridantiroot -f com.</description></item></channel></rss>