Skip to main content

Command Palette

Search for a command to run...

How to Set Up Burp Suite Proxy on Rooted Android with AlwaysTrustUserCerts (Magisk)

Published
4 min read
How to Set Up Burp Suite Proxy on Rooted Android with AlwaysTrustUserCerts (Magisk)
A

I'm a Security Analyst in cybersecurity, focused on keeping applications safe and identifying vulnerabilities. I specialize in application security, analyze and fortify systems against threats, and communicate effectively in fast-paced environments. I've excelled in CTF challenges, showcasing my ability to tackle complex security issues, and I'm committed to continuous learning and innovation in the field.

Setting up Burp Suite with Android devices or emulators can be annoying, especially on newer Android versions where user-installed certificates are not trusted by many apps by default.

There are many ways to solve this, but I used a lesser-known and very easy method using a Magisk module called AlwaysTrustUserCerts.

This guide explains the process.

Requirements

Before starting, you need:

  • Burp Suite installed on your system

  • An Android device or emulator

  • Root access on the Android device

  • Magisk installed

  • AlwaysTrustUserCerts Module installed in Magisk

  • OpenSSL installed on your system

  • The Android device and Burp machine connected to the same network

Use this only on devices, apps, and traffic you own or are authorized to test.

Step 1: Export the Burp Suite Certificate

First, open Burp Suite.

Go to:

Proxy > Proxy settings > Import / export CA certificate

Export the certificate in DER format.

Save it with a name like:

burp.der

Step 2: Convert the Certificate to PEM Format

Android can install certificates from different formats, but for this method I converted the Burp certificate to .pem.

Run:

openssl x509 -inform DER -in burp.der -out burp.pem

Now you should have:

burp.pem

Step 3: Move the Certificate to the Android Device

Transfer the burp.pem file to your Android device.

You can use adb push:

adb push burp.pem /sdcard/Download/

Or you can copy it manually using file transfer.

Step 4: Install the Certificate as a User Certificate

On the Android device, go to:

Settings > Security > Encryption & credentials > Install a certificate

The exact path may differ depending on the phone or Android version, but it is usually under Security or Privacy/Security settings.

Select the burp.pem file and install it as a CA certificate.

At this point, the certificate is installed as a user certificate.

However, many Android apps do not trust user-installed certificates. This is where the useful part comes in.

Step 5: Install AlwaysTrustUserCerts Magisk Module

Download the AlwaysTrustUserCerts Module from Github Releases : Click To Download

Open Magisk and install the module:

AlwaysTrustUserCerts

This module moves or links user-installed CA certificates into the system trusted certificate store, making Android treat them like system certificates.

After installing the module:

  1. Enable the module

  2. Reboot the device

  3. After reboot, confirm the Burp certificate appears under trusted credentials

Now your Burp certificate should be trusted system-wide.

Step 6: Configure Android Proxy

Now set the Android device to use Burp Suite as its proxy.

Option 1: Set Proxy from Wi-Fi Settings

Go to your connected Wi-Fi network settings and set:

Proxy: Manual
Host: Your Burp machine IP
Port: 8080

Example:

Host: 192.168.1.10
Port: 8080

Make sure Burp is listening on the same port.

Option 2: Set Proxy Using ADB

You can also configure the proxy with ADB:

adb shell settings put global http_proxy 192.168.1.10:8080

To remove the proxy later:

adb shell settings put global http_proxy :0

Step 7: Start Intercepting Traffic

In Burp Suite, make sure your proxy listener is active and bound to an interface reachable by the Android device.

Now open an app or browser on Android and check Burp.

You should start seeing HTTP and HTTPS traffic.

Notes

Some apps may still not work if they use certificate pinning. In that case, you may need additional bypass methods such as Frida, Objection, or app patching.

But for many apps and browser traffic, this setup works nicely and avoids manually pushing certificates into Android’s system certificate directory.

Conclusion

The usual Android Burp certificate setup can be painful, especially on modern Android versions. Using Magisk with the AlwaysTrustUserCerts module makes the process much easier.

The flow is simple:

Export Burp cert > Convert to PEM > Install as user cert > Enable AlwaysTrustUserCerts > Reboot > Set proxy

After that, your Android device should trust Burp’s CA certificate and route traffic through Burp Suite successfully.

References