KRISTJÁN ODDSSON · SOFTWARE ENGINEER · ICELAND RSS↗

I recently discovered that you are able to use a combination of the WireGuard vpn app on your iPhone and mitmproxy on your macOS to listen to network requests that your phone is making to the wider network.

mitmproxy's WireGuard server setup screen, showing the generated peer config and a QR code for the iPhone WireGuard app

It's pretty easy to set up:

mitmproxy's flow list view showing intercepted HTTPS requests from the iPhone, including hostnames, methods, status codes, and timings

This is really useful to look at what APIs the apps on your phone are talking to and what the requests and responses look like. You wouldn’t BELIEVE the insecure and weird stuff that apps are doing just because they don’t expect hackers to sniff out the requests like this. On browsers it’s trivial to look at the network panel on devtools so web app authors are almost forced to think about security in a more concrete way whereas app developers might not need to as much.

Check out mitmproxy if this is interesting to you.