能力值:
( LV1,RANK:0 )
|
-
-
26 楼
如果有个判断只脱指定包名的软件就更好了,比如通过读取某个文件来获取要脱壳的包名
|
能力值:
( LV3,RANK:30 )
|
-
-
27 楼
正在学习这个东西,请教一个问题,moto nexus6上刷机之后,安装app脱壳,app出现崩溃,关键的dex没有dump下来,我在stackoverflow上查了下说是android 6.0的bug,崩溃 堆栈如下:01-01 23:51:02.173 888 888 F DEBUG : Abort message: 'art/runtime/java_vm_ext.cc:410] JNI DETECTED ERROR IN APPLICATION: fid == null'
01-01 23:51:02.173 888 888 F DEBUG : r0 00000000 r1 00001d6a r2 00000006 r3 b6f13b7c
01-01 23:51:02.173 888 888 F DEBUG : r4 b6f13b84 r5 b6f13b34 r6 00000000 r7 0000010c
01-01 23:51:02.173 888 888 F DEBUG : r8 b4c7f378 r9 b4cea800 sl 00000001 fp 00000001
01-01 23:51:02.173 888 888 F DEBUG : ip 00000006 sp bebbba68 lr b6c84af1 pc b6c86da8 cpsr 40070010
01-01 23:51:02.190 888 888 F DEBUG :
01-01 23:51:02.190 888 888 F DEBUG : backtrace:
01-01 23:51:02.190 888 888 F DEBUG : #00 pc 00041da8 /system/lib/libc.so (tgkill+12)
01-01 23:51:02.190 888 888 F DEBUG : #01 pc 0003faed /system/lib/libc.so (pthread_kill+32)
01-01 23:51:02.190 888 888 F DEBUG : #02 pc 0001c30f /system/lib/libc.so (raise+10)
01-01 23:51:02.190 888 888 F DEBUG : #03 pc 000194c1 /system/lib/libc.so (__libc_android_abort+34)
01-01 23:51:02.191 888 888 F DEBUG : #04 pc 000174ac /system/lib/libc.so (abort+4)
01-01 23:51:02.191 888 888 F DEBUG : #05 pc 00334699 /system/lib/libart.so (art::Runtime::Abort()+228)
01-01 23:51:02.191 888 888 F DEBUG : #06 pc 000f5373 /system/lib/libart.so (art::LogMessage::~LogMessage()+2226)
01-01 23:51:02.191 888 888 F DEBUG : #07 pc 0025b7ef /system/lib/libart.so (art::JavaVMExt::JniAbort(char const*, char const*)+1550)
01-01 23:51:02.191 888 888 F DEBUG : #08 pc 0025bc1b /system/lib/libart.so (art::JavaVMExt::JniAbortF(char const*, char const*, ...)+74)
01-01 23:51:02.191 888 888 F DEBUG : #09 pc 0028bc8d /system/lib/libart.so (art::JNI::GetLongField(_JNIEnv*, _jobject*, _jfieldID*)+492)
--------------------------------------------------------------------------------------------------------------------------------------
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] JNI DETECTED ERROR IN APPLICATION: fid == null
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] in call to GetLongField
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] from void com.ali.mobisecenhance.StubApplication.attachBaseContext(android.content.Context)
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] "main" prio=5 tid=1 Runnable
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] | group="main" sCount=0 dsCount=0 obj=0x7499d2a0 self=0xb4d36a00
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] | sysTid=7530 nice=0 cgrp=default sched=0/0 handle=0xb6f13b34
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] | state=R schedstat=( 110116613 16576302 156 ) utm=8 stm=3 core=2 HZ=100
01-01 23:51:01.887 7530 7530 F art : art/runtime/java_vm_ext.cc:410] | stack=0xbe3be000-0xbe3c0000 stackSize=8MB
01-01 23:51:01.888 7530 7530 F art : art/runtime/java_vm_ext.cc:410] | held mutexes= "mutator lock"(shared held)
01-01 23:51:01.888 7530 7530 F art : art/runtime/java_vm_ext.cc:410] native: #00 pc 00371871 /system/lib/libart.so (art::DumpNativeStack(std::__1::basic_ostream<char, std::__1::char_traits<char> >&, int, char const*, art::ArtMethod*, void*)+160)
01-01 23:51:01.888 7530 7530 F art : art/runtime/java_vm_ext.cc:410] native: #01 pc 0035117f /system/lib/libart.so (art::Thread::Dump(std::__1::basic_ostream<char, std::__1::char_traits<char> >&) const+150)
01-01 23:51:01.888 7530 7530 F art : art/runtime/java_vm_ext.cc:410] native: #02 pc 0025b4c5 /system/lib/libart.so (art::JavaVMExt::JniAbort(char const*, char const*)+740)
01-01 23:51:01.888 7530 7530 F art : art/runtime/java_vm_ext.cc:410] native: #03 pc 0025bc1b /system/lib/libart.so (art::JavaVMExt::JniAbortF(char const*, char const*, ...)+74)
01-01 23:51:01.888 7530 7530 F art : art/runtime/java_vm_ext.cc:410] native: #04 pc 0028bc8d /system/lib/libart.so (art::JNI::GetLongField(_JNIEnv*, _jobject*, _jfieldID*)+492)
01-01 23:51:01.888 7530 7530 F art : art/runtime/java_vm_ext.cc:410] native: #05 pc 0001b6b4 /data/app/crackme.a3-1/lib/arm/libmobisec.so (???) 还请大佬点拨啊,这个如何解,如果是系统的bug,我是否需要重新换系统版本刷一下,谢谢。
|
能力值:
( LV3,RANK:30 )
|
-
-
28 楼
yimsong
如果有个判断只脱指定包名的软件就更好了,比如通过读取某个文件来获取要脱壳的包名
留下的flag越多,厂商越容易对抗
|
能力值:
( LV1,RANK:0 )
|
-
-
29 楼
|
能力值:
( LV2,RANK:10 )
|
-
-
30 楼
膜拜大佬,请教个问题,最终修复后的文件是通过py修复出来的txt文件吗?能够修复dex吗?
|
能力值:
( LV2,RANK:10 )
|
-
-
31 楼
roysue
有多少`App`支持安卓11呢?安卓10普及都还得再过两年
请问下arm模拟文件里的system.img这些用啥模拟器装呀?
|
能力值:
( LV2,RANK:10 )
|
-
-
32 楼
roysue
再等下,那个有些bug,窝在改。
大佬 Nexus5x 的镜像 现在出来了吗
|
能力值:
( LV1,RANK:0 )
|
-
-
33 楼
roysue
再等下,那个有些bug,窝在改。
大,5x的镜像改好了么
|
能力值:
( LV1,RANK:0 )
|
-
-
34 楼
感谢分享
|
|
|