[Q] How do i analyse ssl network traffic in apps on uncommon ports?

I recently started looking into the data applications, especially the free ones send to the net.
I wanted to know if they leak personal data to their coders.
Therefore i decided to redirect connections through a proxy software on my computer.
I installed and added their ssl ca to the trusted certificates on my cellphone.
It was quite intresting to see what kind of requests certain apps make to the internet, especially when you look inside the ssl encrypted connections.

I then found out that some connections seemed to be missing from that analysis, not enough traffic showed up in the proxy compared to the network activity.
So i used and the resulting file was quite a few times bigger.
It contained connections to other ports than 80/443 which i saw in charles.

So my questions are: Does Android ignore the proxy for non http(s) requests?
How can i redirect EVERY request to my computer and strip the ssl from it to look inside?
I suspect some of the applications to use basic stuff like json, xmpp and xml but cannot proof it currently.
As a beginner, i might also be using the wrong tools.

Show Accepted Answer

Guest Quick Reply (No URL, BBcode or HTML)

Last post by lkihn
16 minutes ago
Last post by tabitha55
3 hours ago
Last post by metz.christopher
3 hours ago
Last post by eve.bednar
3 hours ago