Skip to content

iOS Instagram with SSL pinning / certificate pinning bypassed. Latest version 335.0.8

Notifications You must be signed in to change notification settings

culturally/Instagram-iOS-SSL-pinning-bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Instagram

Instagram iOS with SSL pinning bypassed / Instagram with certificate pinning bypassed. Get your private api endpoints now!

  • DO NOT NEED JAILBREAK
  • DO NOT NEED FRIDA

Support Me

Bitcoin: bc1qlj6685zpthj6kp5fe7cu47pp80xk0d3tzg650m
Solana: 4a91vFCz8SjnqWiJpFuLWwWFpWdT9dZq13hG4o8icv2n
Litecoin: MFi28zedB78kaNiRpi9eBkFRTtGZNoxcWv

Info

  • Current version which was bypassed: 335.0.8
  • You can now intercept all requests
  • iOS Only
  • Tested on iOS 15.4.1
  • Any support is appreciated

Installation

  1. Download the IPA file
  2. Sideload the file (I personally suggest Sideloadly or TrollStore)
  3. Set up the proxy before starting the app (Was tested only with mitmproxy)
  4. Intercept

Bypassed:

Icon Bundle ID Version File Type Download
com.burbn.instagram 335.0.8 IPA Click here
com.burbn.instagram 323.0.3 IPA Click here

Wanna learn how to bypass SSL pinning in apps or Do you have custom request?

Message me on Telegram: @undecryptable

Evidence

What is SSL pinning?

SSL pinning, also known as certificate pinning or public key pinning, is a security mechanism used in digital communication to enhance the security of a connection, particularly within the context of Secure Sockets Layer (SSL) or its successor, Transport Layer Security (TLS).

When a client (such as a web browser or a mobile app) connects to a server over HTTPS, the server presents its SSL/TLS certificate to prove its identity. Normally, the client verifies the server's certificate by checking if it is signed by a trusted Certificate Authority (CA). However, SSL pinning adds an extra layer of security by requiring the client to validate the server's certificate against a known, pre-configured set of certificates or public keys, rather than solely relying on the CA's trust chain.