Android Emulator Setup and Traffic Interception

Jul 12, 2025

Overview

This lecture covers installing Android Studio, setting up multiple Android virtual devices (AVDs), rooting emulators, and intercepting network traffic using Burp Suite.

Installing Android Studio

  • Visit developer.android.com/studio and download Android Studio.
  • Accept terms and conditions, then install the downloaded file.
  • Follow the setup wizard, using default options, and complete installation.
  • At least 16GB of RAM is recommended for smooth operation.

Setting Up Virtual Devices (AVDs)

  • Open Android Studio and go to Virtual Device Manager under "More Actions."
  • Create new virtual devices by clicking "+" and selecting device types and Android versions.
  • Download and install the desired Android images (e.g., API 34 for Android 14).
  • Start AVDs using the play button; multiple versions can run simultaneously.

Rooting an Android Emulator

  • Ensure ADB (Android Debug Bridge) and Git are installed.
  • Download RootAVD from getlab.com and install it using Git.
  • List available AVDs and use rootavd commands to root a selected emulator.
  • The root process installs Magisk and reboots the emulator.
  • Open Magisk in the emulator and follow prompts for final setup.

Verifying Root Access

  • Use ADB shell and the "su" command in the emulator to check for root privileges.
  • Alternatively, install the "Root Checker" app from the Play Store to verify root status.

Intercepting Traffic with Burp Suite

  • Download and install the Burp Suite Community Edition.
  • Configure Burp Suite proxy to a chosen local IP address and port (e.g., 192.168.1.183:8080).
  • On the Android emulator, configure Wi-Fi proxy settings to point to the Burp Suite proxy.
  • Download and install the Burp CA certificate on the emulator via settings > security > install CA certificate.
  • Turn on interception in Burp and observe, forward, or analyze HTTP(S) requests made by apps in the emulator.

Use Cases for Rooted Emulators

  • Rooted emulators enable penetration testing, reverse engineering, and enhanced feature access.
  • Useful for testing apps that require root or for security research.

Troubleshooting Tips

  • Restart Android Studio, emulator, or Burp Suite if interception fails.
  • Re-enter proxy settings in Burp Suite after restarting, since settings may not persist.

Key Terms & Definitions

  • Android Studio — Official IDE for Android app development and emulator management.
  • AVD (Android Virtual Device) — An emulator representing a device configuration.
  • ADB (Android Debug Bridge) — Tool for communicating with Android devices via command line.
  • Rooting — Process of gaining administrative (root) privileges on Android.
  • Magisk — A tool for rooting Android devices.
  • Burp Suite — Software for intercepting and analyzing network traffic.
  • CA Certificate — Certificate Authority file needed for trusted HTTPS interception.

Action Items / Next Steps

  • Download and install Android Studio and required virtual device images.
  • Set up RootAVD and root at least one emulator.
  • Install and test Burp Suite with proxy and certificate setup.
  • (Optional) Download the Root Checker app to confirm rooting.
  • Review troubleshooting steps if issues with proxy or root arise.