From e9d64e359049d84fcd9451c675241663d403d1f9 Mon Sep 17 00:00:00 2001 From: carlospolop Date: Tue, 20 May 2025 07:14:28 +0200 Subject: [PATCH] f2 --- src/mobile-pentesting/android-app-pentesting/flutter.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/mobile-pentesting/android-app-pentesting/flutter.md b/src/mobile-pentesting/android-app-pentesting/flutter.md index 7c27d6d8d..9d73aef81 100644 --- a/src/mobile-pentesting/android-app-pentesting/flutter.md +++ b/src/mobile-pentesting/android-app-pentesting/flutter.md @@ -8,7 +8,7 @@ The Engine bundles a **Dart VM**, **BoringSSL**, Skia, etc., and ships as the sh ## Intercepting HTTPS traffic in Flutter -Thsi is a summary of this [blog post](https://sensepost.com/blog/2025/intercepting-https-communication-in-flutter-going-full-hardcore-mode-with-frida/). +This is a summary of this [blog post](https://sensepost.com/blog/2025/intercepting-https-communication-in-flutter-going-full-hardcore-mode-with-frida/). ### Why HTTPS interception is tricky in Flutter * **SSL/TLS verification lives two layers down** in BoringSSL, so Java SSL‐pinning bypasses don’t touch it.