About HTTPS Sniffing
- This page: Https sniffing introdution
- BetterFGO apk: For JP/NA sniffing
- Transfer Data: Keep JP/NA account data in multiple clients
- Stream-iOS: Only for CN/TW sniffing on iOS
- HttpCanary-Android: JP/NA/CN/TW on Android
- Charles-PC: Android/iOS with Charles(PC)
- mitmproxy-PC: Android/iOS with mitmproxy(PC)
FGO JP/NA/KR app has cert-pinning, which will reject custom cert. So we must use modified apk, BFGO has stopped sniffing support because of some people use it to cheat.
For CN/TW, Android/iOS are both supported yet.
Capture the network traffic when FGO client login to terminal which contains the data of all servants(ascension/palingenesis/bond/active skill/append skill/costume/coins), materials and CEs. Then easily import it to Chaldea app, no need to manually input servant data anymore.
The tutorial is just an example. The core of the method is HTTPS traffic capture, so any method or software that can obtain the https response body can be used, such as Charles, Fiddler, mitmproxy, Surge or NetCapture. You can search the following keywords
Charles/https sniffing/mobile/emulator/global proxy to find more online tutorials.
Note that the final exported data must only include the response body, excluding response headers and other information, and the response body must be a valid json(for JP/NA), or base64 encoded string(for CN/TW).
Make sure you are aware of the risk of capturing HTTPS traffic. Chaldea app only reads the sniffed data which doesn't contains accounts secrets or password.
But if you are using simulating login JP/NA via auth file(recent added), it does read your login secrets to perform a login in chaldea app.
Here, a simple principle about https sniffing gives a brief introduction of the potential risks. You can search more about MITM and cert-pinning on internet.
The network traffics are HTTPS encrypted, thus, we need some tricks to hacking it. Fiddler and Charles are the mostly used network debugging proxy which support HTTPS decryption by injecting its CA certificate into client device. Then most https traffic can be sniffed and decrypted from the client device.
- make sure you are using the legal copy of Fiddler/Charles software
- remove or don't trust the installed CA cert once you finished importing to Chaldea
Further, JP/NA/KR FGO client will validate the certificate before establish https connection, so the above CA cert will be rejected.
Now we need to modify the client app to remove the https cert validation. This doc will use the apk mod by rayshift.io. Obviously, Android is supported and only JP and NA(EN) version mods are provided.
For CN/TW version, you don't this step, and both Android and iOS version of original FGO clients support https sniffing.