首页
社区
课程
招聘
【OSG】【非越狱调试】通过案例入门Frida-各种高级功能
发表于: 2017-12-13 23:04 7880

【OSG】【非越狱调试】通过案例入门Frida-各种高级功能

2017-12-13 23:04
7880

Android Frida


 

http://www.ninoishere.com/frida-learn-by-example/


编译Frida-server 也可以直接下载

  • 设置ANDROID_NDK_ROOT
  • 直接 make server-android 即可

在build文件夹中

Firda 工具安装

sudo pip install frida

基本验证

push frida-server 到Android 端

 

PC端 使用命令check

 

image

实验

Frida-trace 扩展

image

iOS 拦截API


 

后面的实验 资源均来自

https://github.com/illnino/frida-learn-by-example

Root Detection Bypass, Hook the password [Android]

  1. adb install .apk
    image
    ~~~~
    *
    @ubuntu:~/kanxue/frida-learn-by-example/3. Root_detection_hook_password$ frida -U -f sg.vantagepoint.uncrackable1
    / | Frida 10.5.6 - A world-class dynamic instrumentation framework
    | (
    | |

    | Commands:
    /
    / |_| help -> Displays the help system
    . . . . object? -> Display information about 'object'
    . . . . exit/quit -> Exit
    . . . .
    . . . . More info at http://www.frida.re/docs/home/
    Spawned sg.vantagepoint.uncrackable1. Use %resume to let the main thread start executing!
    [MStar Semiconductor, Inc. Unique75::sg.vantagepoint.uncrackable1]-> %resume
    [MStar Semiconductor, Inc. Unique75::sg.vantagepoint.uncrackable1]-> %load
    load command expects 1 argument
    [MStar Semiconductor, Inc. Unique75::sg.vantagepoint.uncrackable1]-> %load exploit1.js
    [MStar Semiconductor, Inc. Unique75::sg.vantagepoint.uncrackable1]-> [] Starting script
    [
    ] onClick handler modified
    [] onClick called
    [MStar Semiconductor, Inc. Unique75::sg.vantagepoint.uncrackable1]->
    [MStar Semiconductor, Inc. Unique75::sg.vantagepoint.uncrackable1]-> %load exploit2.js
    [MStar Semiconductor, Inc. Unique75::sg.vantagepoint.uncrackable1]-> [
    ] Starting script
    [] onClick handler modified
    [
    ] sg.vantagepoint.a.a.a modified
    [*] Decrypted: I want to believe

### Brute Force PIN [Android]
1.   adb install *apk 
![image](https://raw.githubusercontent.com/r0ysue/OSG-TEAMS/master/YI/%E3%80%90%E9%9D%9E%E8%B6%8A%E7%8B%B1%E8%B0%83%E8%AF%95%E3%80%91%E9%80%9A%E8%BF%87%E6%A1%88%E4%BE%8B%E5%85%A5%E9%97%A8Frida//pic/3.jpg)
2.   frida-ps -Uai

*l@ubuntu:~/kanxue/frida-learn-by-example/4. brute_force_pin$ frida-ps -Uai
PID Name Identifier


 

2329 Android系统 android
3357 BianQue com.stv.bq
3252 CDEService com.stv.cdeapk
2803 CommonService com.stv.commonservice
3074 CrashHandler com.stv.bsp.qccrashhandler
2329 EUI 系统 eui.tv
12122 LeKey com.stv.lekey
10696 LolliPin com.github.orangegangsters.lollipin
3139 MonitorService com.stv.monitor
2050 MusicFX com.android.musicfx
4662 NetMisc com.stv.net.misc
3768 NetworkDiagnotics com.stv.network.diagnotics
2085 Pico TTS com.svox.pico
3087 Pppoe com.mstar.android.pppoe
12381 QQ音乐 com.tencent.qqmusictv.qing

找到 Lollipin  这个之前已经resume了 ,开始是没有PID的

3. 暴力破解

dengsl@ubuntu:~/kanxue/frida-learn-by-example/4. brute_force_pin$ python exploit.py
[] Bruteforcing PIN code
[
] Testing PIN 1230: false
[] Testing PIN 1231: false
[
] Testing PIN 1232: true
[] Testing PIN 1233: false
[
] Testing PIN 1234: false

找到PIN码 是返回true


### 实验  Get Encryption Key


1. install apk
2. frida-ps -Uai

frida-ps -Uai
PID Name Identifier


 

2329 Android系统 android
3357 BianQue com.stv.bq
3252 CDEService com.stv.cdeapk
2803 CommonService com.stv.commonservice
3074 CrashHandler com.stv.bsp.qccrashhandler
2329 EUI 系统 eui.tv *

-  mStar customer SDK Tests            tvtests.com.mstar.android.tv        
-  yekehtmai                           kr.repo.h2spice.yekehtmai           
-  万象搜索                                com.letv.leso                       
-  下载中心                                com.stv.downloads                   
-  主题                                  com.stv.thememanager       
APK 对应的包名 kr.repo.h2spice.yekehtmai 

3.  resume  and load JS

frida -U -f kr.repo.h2spice.yekehtmai

 ____
/ _  |   Frida 10.5.6 - A world-class dynamic instrumentation framework

| (_| |

> _  |   Commands:

// || help -> Displays the help system
. . . . object? -> Display information about 'object'
. . . . exit/quit -> Exit
. . . .
. . . . More info at http://www.frida.re/docs/home/
Spawned kr.repo.h2spice.yekehtmai. Use %resume to let the main thread start executing!
[MStar Semiconductor, Inc. Unique75::kr.repo.h2spice.yekehtmai]-> %resume
[MStar Semiconductor, Inc. Unique75::kr.repo.h2spice.yekehtmai]-> %load exploit.js
[MStar Semiconductor, Inc. Unique75::kr.repo.h2spice.yekehtmai]-> String1: kkkkk
String2: 3246847986364861
Error: Implementation for a expected return value compatible with 'java.lang.String'.
at a (input:1)
String1: xxxxx
String2: 3246847986364861

 

~~~~
得到AES key 3246847986364861


[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//