- Overview
- Pre-installation
- Installation
- Tapioca Quick Start
- Tapioca Desktop Layout
- Tapioca GUI Usage
- Tapioca Capture Modes
- Strategies for Using Tapioca
- Manual Execution of Scripts
CERT Tapioca is a utility for testing mobile or any other application using MITM techniques. CERT Tapioca development was sponsored by the United States Army Armament Research, Development and Engineering Center (ARDEC) as well as the United States Department of Homeland Security (DHS). Installation requirements:
- Supported platforms include: Raspbian (Jessie or Stretch), Raspberry Pi OS, Debian 10, Centos (7, 8, or Stream 8), RedHat Enterprise Linux 7, Fedora (25 through 33), openSUSE (15.x or Tumbleweed), or Ubuntu (16.04, 18.04, 20.04, or 22.04). Other platforms may work, but the installer has only been tested on these distros.
- 1GB of RAM
- Upstream internet connectivity that does not require an explicit proxy.
- Ability to provide wireless access to your device under test, which means either:
- An available wired network adapter that a wireless access point can be plugged into.
- A USB wireless adapter that supports HOSTAP mode. e.g. https://smile.amazon.com/TP-Link-N150-Wireless-Adapter-TL-WN722N/dp/B002SZEOLG
NOTE: CERT Tapioca installation will transform your system into a Tapioca "appliance". It is not recommended to install it on a system that you use for other purposes.
Install a supported Linux distribution on your machine. Running on bare metal and in a virtual machine are supported. Any installation style (from text-only through full GUI) for the host OS is supported. Just ensure:
- Internet connectivity is working.
- A user named "tapioca" exists, and has administrative privileges.
- The "tapioca" user is logged in.
Before installing Tapioca, decide how you will be providing network connectivity to the clients under test. Options include:
- Use a wired network adapter. This adapter should be configured to use the IP
10.0.0.1/24
before attempting installation. Other addressing schemes can be used, but will require editingtapioca.cfg
and/etc/dhcp/dhcpd.conf
- Use a wireless USB adapter that supports HOSTAP mode.
CERT Tapioca requires root privileges for several capabilities that it uses. For this reason, the Tapioca installer configures a system to not prompt the user for sudo privileges. Any user with access to the CERT Tapioca system will have root privileges. The "Full HTTPS inspection" certificate/key combination is static across all CERT Tapioca installations. For this reason, any system or device that has the full HTTPS inspection mitmproxy root CA certificate installed should not be used on untrusted networks. The same capability that allows you to use Tapioca to fully inspect HTTPS traffic can allow anyone else with a CERT Tapioca installation to perform the same inspection.
- Obtain the Tapioca code. This can be accomplished by performing a
git clone
of the Tapioca repository, or by downloading and extracting a zip file of the repository. - Ensure that the Tapioca code lives in the
/home/tapioca/tapioca
directory. If you have obtained Tapioca via a zip file, this may require that you rename thetapioca-master
directory totapioca
. - Run the installer:
[tapioca@localhost tapioca]$ ./install_tapioca.sh
Follow any prompts. - Reboot when done.
- If given a choice, log in with the tapioca user and choose the Xfce login session.
If for any reason the installation fails, check and correct any relevant errors and run
./install_tapioca.sh
again.
Tapioca downloads and compiles Wireshark to ensure compatibility with RedHat Enterprise Linux and Centos, which provide Wireshark versions older than what Tapioca needs. If you wish to have Tapioca use your own version of Wireshark, simply ensure that /usr/local/bin/tshark
is from the version of Wireshark that you wish to use before running ./install_tapioca.sh
.
- Connect a HOSTAP-capable WiFi adapter to your Tapioca machine.
- Click the Software WiFi AP button (Radio tower) to enable your wireless access point.
- Connect your device to the Tapioca access point.
- Click the Tapioca GUI button to launch the main testing interface.
- Configure the OS of the Tapioca machine to set the second network adapter to
10.0.0.1/24
- If this network was not already configured at install time, re-run
./install_tapioca.sh
or manually edittapioca.cfg
to specify this network device name forinternal_net
. - If using Tapioca in a virtual machine, configure the second network adapter of the Tapioca VM to be bridged to an unused physical network adapter.
- Connect the access point uplink port to the Tapioca LAN port.
- Connect your device to the access point.
- Click the Tapioca GUI button to launch the main testing interface.
- Configure the OS of the Tapioca machine to set the second network adapter to
10.0.0.1/24
- Connect the second Tapioca network adapter to a custom network and ensure that your virtualization software is NOT providing dhcp to this virtual network.
- If this network was not already configured at install time, re-run
./install_tapioca.sh
or manually edittapioca.cfg
to specify this network device name forinternal_net
. - Connect the network adapter of the virtual machine that has your under-test application to the same virtual network that you have configured the second network adapter of the Tapioca VM to use.
- Click the Tapioca GUI button to launch the main testing interface.
Once you have installed Tapioca, you should end up with a screen like the below. Individual icons may vary slightly across platforms.
Open a file manager to view already-tested applications.
Open a terminal to allow manual execution of scripts.
Open Chromium web browser.
This button will configure a connected WiFi adapter for HOSTAP mode. This will allow you to wirelessly connect your client device to Tapioca for traffic inspection.
Launch the main Tapioca interface.
Use tcpdump to capture all raw network traffic without interfering.
Use mitmproxy to intercept HTTP/HTTPS traffic, using an untrusted root certificate. Any HTTPS traffic that passes through is an indication of a client that isn't validating HTTPS certificates.
Use mitmproxy to intercept HTTP/HTTPS traffic, using a root certificate that has been installed on the client system. This allows full inspection of non-pinned HTTPS traffic.
Stop any (tcpdump, mitmproxy) capture.
While the Tapioca platform provides buttons to launch individual tests, the Tapioca GUI will provide most of the capabilities that you will need.
To be able to run all of the reports included with Tapioca, three captures are required.:
In "All traffic with tcpdump" mode, Tapioca doesn't interfere with HTTPS negotiation. This allows Tapioca to inspect the HTTPS handshakes that occur between a client and a server. If a client is using insecure crypto, or protocols other than HTTP/HTTPS, then the tcpdump capture will be required to detect this. This capture is required to allow the Crypto test report to be generated.
In "Verify SSL validation" mode, Tapioca will intercept web traffic, and the HTTPS communications between the client and Tapioca will use an invalid root CA certificate. Any client that allows HTTPS traffic through Tapioca without warning is vulnerable to malicious interception. Despite the client using HTTPS, it is not receiving the benefits that HTTPS aims to provide. This capture is required to allow the SSL test report to be generated.
In "Full HTTPS inspection" mode, Tapioca will intercept web traffic, and the HTTPS communications between the client and Tapioca will use a valid root CA certificate that has been installed on the client. This allows searching for content in web traffic, even if it has been encrypted with HTTPS. This capture is required to allow Search capabilities within encrypted, but not pinned, network traffic.
For each client application being tested, run through the normal operations for using the client while the traffic is being captured in each of the three modes:
- All traffic with tcpdump
- Verify SSL validation
- Full HTTPS inspection
At the end of each test, be sure to stop the capture using the Tapioca GUI or by clicking the stop sign icon at the bottom of the screen. Before starting the next test, be sure to terminate the application being tested. An uninstall of the application between tests will ensure thoroughness of the test. For example, some applications install a service that continues to run even after the application is terminated.
After traffic is captured in all three modes, press the "Generate reports" button. The SSL test and the Crypto test have PASSED/FAILED statuses. The network connectivity test simply generates a report of hosts contacted. Results for all three tests can be viewed by using the Tapioca GUI.
When entering any data into a form, always use the same values. This can allow you to search for your data. For example, if you are presented with a password field, if you always use "passssss" that will allow you to search for that value in the traffic.
If you are not using the Tapioca GUI, need to troubleshoot problems, or if you would like to run the utilities against existing network captures (e.g. a pcap file), there are command-line utilities:
checkcrypto.py
- Validate that HTTPS negotiations are secure (pcap required)checknet.py
- Enumerate hosts contacted using which protocols, as well as which host names are resolved (pcap required)checkssl.py
- Validate that a client is verifying that an SSL certificate is issued by a trusted provider (mitmproxy log file required)search.py
- Search for strings in network captures (pcap and/or mitmproxy log file required)