If you setup SSL interception with tools like mitmproxy or Burp and then import the proxy CA of this interception proxy into the android certificate store as trusted then you should be able to intercept the connection, ie get the plain text. If instead the application fails and maybe throws out some error about failing SSL verification than this application is probably doing SSL pinning.
The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.