在使用frida的过程中,在我的认知里其实frida只做了2件事情,一件是注入,一件是hook,作为注入的特征我们可以通过ptrace(PTRACE_TRACEME,NULL,0,0),或者从文件里面索引有关frida字符串这样的方式来检测frida,那么作为hook特征是否也能够检测frida呢?
答案是肯定的,既然frida是能够定向跳转从而更改内存中的代码,那么一定是用到了inlinehook的技术,那么它是怎么使用的inlinehook呢,我们可以使用ida(当然直接看frida源码,但是那样真的很麻烦就连我自己写的inlinehook都很难快速的分析清楚)去看一下,我随便hook了一个函数比如art::ClassLinker::LoadMethod
,注意要先附加frida然后再使用ida链接,否则frida无法附加已经被ptrace附加的进程,然后,结果如下图
可以看到frida的hook原理就是将函数的开头改成这样的一串16进制,0xd61f020058000050
和我之前写的inlinehook差不多,只是它用了x16寄存器我用了x17寄存器,那么这里就有一个思路了,我们能否通过so中是否有这一段来判断用户使用了frida呢?答案是肯定的,但是需要我们稍作调整,就是在每个函数的开头检测是否有0xd61f020058000050
这样的一段代码,创建线程即可,那么下面就开始实现,首先试一下单个函数能不能成功,我使用了上篇文章提到的,提取符号首地址的方式findsym
可以看到当我以attach的方式链接上去的时候,成功的检测到了frida,那么其实我们就可以遍历符号表来获得一个so中所有的函数首地址来检测是否使用了frida,由于之前也说过,某些函数不在导出表中,而在符号表中,所以可能没有办法通过程序头获取,所以系统so这方面用节头获取,自身so方面用程序头获取(自身so路径不太好确定,所以直接用内存中的就好),这里以libart.so和libnative-lib.so来做一个例子。首先就是libart.so,这里我封装了2个函数一个是获得所有符号的首地址,一个是获得大小都是通过节头表索引得到的,其中enumsym这个函数用到了2个int,第一个size是最大值,第二个start1是最小值,通过外部传入,因为有些符号表的值大于文件所以容易溢出
之后把这两个函数调用写入线程函数就好了,我这里直接用0x25000了通过libart.so的程序头可以解析出来,每10秒检测一次
看一下结果,效果不错就是检测的慢一点但是也达到了预定的目标
接着我们继续搞libnative-lib,这个由于目录特殊性所以我们很难找到它的目录从节头里面搜索符号地址,所以我们只能用程序头搜索它的导出函数,这个之前的文章也讲过,这里就直接贴代码了,这里注意一点,如何确定符号表的大小,仔细观察就知道符号表后面就是字符串表,那么用符号表偏移减去字符串表偏移就是符号表的大小
使用frida脚本hook Java_com_r0ysue_antifrida_MainActivity_stringFromJNI
,看一下效果
上篇文章说了Java hook,的做法是将Java函数转化为Native函数,所以我们可以在关键函数上检测是否是Native的方法来检测frida,当然也可以用解析dex的方式来获得所有的类表和所有的函数名,我这里就先不搞了,有机会下篇文章再搞,我这里只提供一个最简单的方式,就是通过Methid来获得ArtMethod的方法检测是否是Native函数,具体做法可以参考上一篇文章,我这里直接贴代码了,我这里使用反射,但是注意由于线程不同所以env不同,不能将主线程的env传入检测线程使用。
以attach的方式附加检测效果如下
我这里提供的frida检测方法还是比较简单的,当然可以加上各种混淆和自实现线程创建函数,又或者是fork子进程,今天的内容就到这里,感谢大家观看。
function main() {
var libart
=
Module.enumerateSymbols(
"libart.so"
);
var addr
=
NULL;
for
(var n
in
libart) {
if
(libart[n].name.indexOf(
"lassLinker10LoadMethodERKNS"
) >
=
0
) {
addr
=
libart[n].address;
break
;
}
}
Interceptor.attach(addr, {
onEnter: function (arg) {
}
})
}
function main() {
var libart
=
Module.enumerateSymbols(
"libart.so"
);
var addr
=
NULL;
for
(var n
in
libart) {
if
(libart[n].name.indexOf(
"lassLinker10LoadMethodERKNS"
) >
=
0
) {
addr
=
libart[n].address;
break
;
}
}
Interceptor.attach(addr, {
onEnter: function (arg) {
}
})
}
void anti1(){
while
(
1
) {
sleep(
1
);
int
so
=
findsym(
"/system/lib64/libart.so"
,
"_ZN3art11ClassLinker10LoadMethodERKNS_7DexFileERKNS_21ClassDataItemIteratorENS_6HandleINS_6mirror5ClassEEEPNS_9ArtMethodE"
);
long
long
as
=
*
(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so);
if
(as
=
=
0xd61f020058000050
) {
__android_log_print(
6
,
"r0ysue"
,
"i find frida %p"
,(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so));
}
}
}
pthread_create(&thread, nullptr, reinterpret_cast<void
*
(
*
)(void
*
)>(anti1), nullptr);
void anti1(){
while
(
1
) {
sleep(
1
);
int
so
=
findsym(
"/system/lib64/libart.so"
,
"_ZN3art11ClassLinker10LoadMethodERKNS_7DexFileERKNS_21ClassDataItemIteratorENS_6HandleINS_6mirror5ClassEEEPNS_9ArtMethodE"
);
long
long
as
=
*
(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so);
if
(as
=
=
0xd61f020058000050
) {
__android_log_print(
6
,
"r0ysue"
,
"i find frida %p"
,(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so));
}
}
}
pthread_create(&thread, nullptr, reinterpret_cast<void
*
(
*
)(void
*
)>(anti1), nullptr);
int
*
enumsym(const char
*
lib,
int
size,
int
start1){
int
fd;
void
*
start;
struct stat sb;
fd
=
open
(lib, O_RDONLY);
fstat(fd, &sb);
start
=
mmap(NULL, sb.st_size, PROT_READ, MAP_PRIVATE, fd,
0
);
Elf64_Ehdr header;
memcpy(&header, start, sizeof(Elf64_Ehdr));
int
secoff
=
header.e_shoff;
int
secsize
=
header.e_shentsize;
int
secnum
=
header.e_shnum;
int
secstr
=
header.e_shstrndx;
Elf64_Shdr strtab;
memcpy(&strtab, (char
*
) start
+
secoff
+
secstr
*
secsize, sizeof(Elf64_Shdr));
int
strtaboff
=
strtab.sh_offset;
char strtabchar[strtab.sh_size];
memcpy(&strtabchar, (char
*
) start
+
strtaboff, strtab.sh_size);
Elf64_Shdr enumsec;
int
gotoff
=
0
;
int
gotsize
=
0
;
int
strtabsize
=
0
;
int
stroff
=
0
;
for
(
int
n
=
0
; n < secnum; n
+
+
) {
memcpy(&enumsec, (char
*
) start
+
secoff
+
n
*
secsize, sizeof(Elf64_Shdr));
if
(strcmp(&strtabchar[enumsec.sh_name],
".symtab"
)
=
=
0
) {
gotoff
=
enumsec.sh_offset;
gotsize
=
enumsec.sh_size;
}
if
(strcmp(&strtabchar[enumsec.sh_name],
".strtab"
)
=
=
0
) {
stroff
=
enumsec.sh_offset;
strtabsize
=
enumsec.sh_size;
}
}
int
realoff
=
0
;
char relstr[strtabsize];
Elf64_Sym tmp;
memcpy(&relstr, (char
*
) start
+
stroff, strtabsize);
int
*
sdc
=
static_cast<
int
*
>(malloc(gotsize
/
sizeof(Elf64_Sym)
*
sizeof(
int
*
)));
/
/
存储返回值数组
for
(
int
n
=
0
; n < gotsize; n
=
n
+
sizeof(Elf64_Sym)) {
memcpy(&tmp, (char
*
)start
+
gotoff
+
n, sizeof(Elf64_Sym));
/
/
__android_log_print(
6
,
"r0ysue"
,
"%x"
,gotoff
+
n);
sdc[n
/
sizeof(Elf64_Sym)]
=
tmp.st_value;
if
(tmp.st_value>size||tmp.st_value<start1)
sdc[n
/
sizeof(Elf64_Sym)]
=
start1;
}
return
sdc;
}
int
getsymsize(const char
*
lib){
int
fd;
void
*
start;
struct stat sb;
fd
=
open
(lib, O_RDONLY);
/
*
打开
/
etc
/
passwd
*
/
fstat(fd, &sb);
/
*
取得文件大小
*
/
start
=
mmap(NULL, sb.st_size, PROT_READ, MAP_PRIVATE, fd,
0
);
Elf64_Ehdr header;
memcpy(&header, start, sizeof(Elf64_Ehdr));
int
secoff
=
header.e_shoff;
int
secsize
=
header.e_shentsize;
int
secnum
=
header.e_shnum;
int
secstr
=
header.e_shstrndx;
Elf64_Shdr strtab;
memcpy(&strtab, (char
*
) start
+
secoff
+
secstr
*
secsize, sizeof(Elf64_Shdr));
int
strtaboff
=
strtab.sh_offset;
char strtabchar[strtab.sh_size];
memcpy(&strtabchar, (char
*
) start
+
strtaboff, strtab.sh_size);
Elf64_Shdr enumsec;
int
gotoff
=
0
;
int
gotsize
=
0
;
int
strtabsize
=
0
;
int
stroff
=
0
;
for
(
int
n
=
0
; n < secnum; n
+
+
) {
memcpy(&enumsec, (char
*
) start
+
secoff
+
n
*
secsize, sizeof(Elf64_Shdr));
if
(strcmp(&strtabchar[enumsec.sh_name],
".symtab"
)
=
=
0
) {
gotoff
=
enumsec.sh_offset;
gotsize
=
enumsec.sh_size;
}
if
(strcmp(&strtabchar[enumsec.sh_name],
".strtab"
)
=
=
0
) {
stroff
=
enumsec.sh_offset;
strtabsize
=
enumsec.sh_size;
}
}
return
gotsize
/
sizeof(Elf64_Sym);
}
int
*
enumsym(const char
*
lib,
int
size,
int
start1){
int
fd;
void
*
start;
struct stat sb;
fd
=
open
(lib, O_RDONLY);
fstat(fd, &sb);
start
=
mmap(NULL, sb.st_size, PROT_READ, MAP_PRIVATE, fd,
0
);
Elf64_Ehdr header;
memcpy(&header, start, sizeof(Elf64_Ehdr));
int
secoff
=
header.e_shoff;
int
secsize
=
header.e_shentsize;
int
secnum
=
header.e_shnum;
int
secstr
=
header.e_shstrndx;
Elf64_Shdr strtab;
memcpy(&strtab, (char
*
) start
+
secoff
+
secstr
*
secsize, sizeof(Elf64_Shdr));
int
strtaboff
=
strtab.sh_offset;
char strtabchar[strtab.sh_size];
memcpy(&strtabchar, (char
*
) start
+
strtaboff, strtab.sh_size);
Elf64_Shdr enumsec;
int
gotoff
=
0
;
int
gotsize
=
0
;
int
strtabsize
=
0
;
int
stroff
=
0
;
for
(
int
n
=
0
; n < secnum; n
+
+
) {
memcpy(&enumsec, (char
*
) start
+
secoff
+
n
*
secsize, sizeof(Elf64_Shdr));
if
(strcmp(&strtabchar[enumsec.sh_name],
".symtab"
)
=
=
0
) {
gotoff
=
enumsec.sh_offset;
gotsize
=
enumsec.sh_size;
}
if
(strcmp(&strtabchar[enumsec.sh_name],
".strtab"
)
=
=
0
) {
stroff
=
enumsec.sh_offset;
strtabsize
=
enumsec.sh_size;
}
}
int
realoff
=
0
;
char relstr[strtabsize];
Elf64_Sym tmp;
memcpy(&relstr, (char
*
) start
+
stroff, strtabsize);
int
*
sdc
=
static_cast<
int
*
>(malloc(gotsize
/
sizeof(Elf64_Sym)
*
sizeof(
int
*
)));
/
/
存储返回值数组
for
(
int
n
=
0
; n < gotsize; n
=
n
+
sizeof(Elf64_Sym)) {
memcpy(&tmp, (char
*
)start
+
gotoff
+
n, sizeof(Elf64_Sym));
/
/
__android_log_print(
6
,
"r0ysue"
,
"%x"
,gotoff
+
n);
sdc[n
/
sizeof(Elf64_Sym)]
=
tmp.st_value;
if
(tmp.st_value>size||tmp.st_value<start1)
sdc[n
/
sizeof(Elf64_Sym)]
=
start1;
}
return
sdc;
}
int
getsymsize(const char
*
lib){
int
fd;
void
*
start;
struct stat sb;
fd
=
open
(lib, O_RDONLY);
/
*
打开
/
etc
/
passwd
*
/
fstat(fd, &sb);
/
*
取得文件大小
*
/
start
=
mmap(NULL, sb.st_size, PROT_READ, MAP_PRIVATE, fd,
0
);
Elf64_Ehdr header;
memcpy(&header, start, sizeof(Elf64_Ehdr));
int
secoff
=
header.e_shoff;
int
secsize
=
header.e_shentsize;
int
secnum
=
header.e_shnum;
int
secstr
=
header.e_shstrndx;
Elf64_Shdr strtab;
memcpy(&strtab, (char
*
) start
+
secoff
+
secstr
*
secsize, sizeof(Elf64_Shdr));
int
strtaboff
=
strtab.sh_offset;
char strtabchar[strtab.sh_size];
memcpy(&strtabchar, (char
*
) start
+
strtaboff, strtab.sh_size);
Elf64_Shdr enumsec;
int
gotoff
=
0
;
int
gotsize
=
0
;
int
strtabsize
=
0
;
int
stroff
=
0
;
for
(
int
n
=
0
; n < secnum; n
+
+
) {
memcpy(&enumsec, (char
*
) start
+
secoff
+
n
*
secsize, sizeof(Elf64_Shdr));
if
(strcmp(&strtabchar[enumsec.sh_name],
".symtab"
)
=
=
0
) {
gotoff
=
enumsec.sh_offset;
gotsize
=
enumsec.sh_size;
}
if
(strcmp(&strtabchar[enumsec.sh_name],
".strtab"
)
=
=
0
) {
stroff
=
enumsec.sh_offset;
strtabsize
=
enumsec.sh_size;
}
}
return
gotsize
/
sizeof(Elf64_Sym);
}
int
*
so ;
int
size ;
/
/
写到全局变量里面循环就不会多次调用了
void anti1(){
while
(
1
) {
pthread_mutex_lock(&mutex);
for
(
int
n
=
0
; n < size; n
+
+
) {
/
/
__android_log_print(
6
,
"r0ysue"
,
"i find frida %p %x %x"
,(
long
long
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so[n]),so[n],n);
long
long
as
=
*
(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so[n]);
/
/
__android_log_print(
6
,
"r0ysue"
,
"i find frida %d %x %p"
,n,so[n],as);
if
(as
=
=
0xd61f020058000050
) {
__android_log_print(
6
,
"r0ysue"
,
"i find frida %p"
,
(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so[n]));
}
}
sleep(
5
);
pthread_mutex_unlock(&mutex);
}
}
void __init(){
so
=
enumsym(
"/system/lib64/libart.so"
, (
long
) end
-
(
long
) startr,
0x25000
);
size
=
getsymsize(
"/system/lib64/libart.so"
);
}
int
*
so ;
int
size ;
/
/
写到全局变量里面循环就不会多次调用了
void anti1(){
while
(
1
) {
pthread_mutex_lock(&mutex);
for
(
int
n
=
0
; n < size; n
+
+
) {
/
/
__android_log_print(
6
,
"r0ysue"
,
"i find frida %p %x %x"
,(
long
long
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so[n]),so[n],n);
long
long
as
=
*
(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so[n]);
/
/
__android_log_print(
6
,
"r0ysue"
,
"i find frida %d %x %p"
,n,so[n],as);
if
(as
=
=
0xd61f020058000050
) {
__android_log_print(
6
,
"r0ysue"
,
"i find frida %p"
,
(
long
long
*
) reinterpret_cast<
long
>((char
*
) startr
-
0x25000
+
so[n]));
}
}
sleep(
5
);
pthread_mutex_unlock(&mutex);
}
}
void __init(){
so
=
enumsym(
"/system/lib64/libart.so"
, (
long
) end
-
(
long
) startr,
0x25000
);
size
=
getsymsize(
"/system/lib64/libart.so"
);
}
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课