I was wonder what other people (who reached out to OP for this gig on this sub about a week ago) found out about Keeta?
Did anyone managed to intercept the app's traffic?
What challenges did you guys' encounter?
As I also tried to take part in that challenge and encountered SSL pinning while using Burp alone, therefore I tried it with Frida in a rooted android emulator and encountered emulator detection.
However, because I'm unable to root my actual phone, I tried to inject the Frida-Gadget into the APK and repackaged it, to run Frida on a non-rooted device. But it turns out, they also have tempering detection, hence, patching won't work either.
Now, currently I'm trying to arrange an android device within my budge, to root it and run Frida server normally on it, as my current devices are not rootable.
However, while waiting for a great option (which is also within my budget), I discovered that they have root detection as well, but I only found it at 2 places in the decompiled Samli code and I asked someone on reddit to run Keeta on their rooted device and it worked normally there, because root detection can be bypassed sometimes.
Let me know what's your experience guys.