Please take my comment as a constructive criticism; do prepare before recording a video. Waiting for the Android Studio to boot up and to load the project, deciding whether or not Frida's server were running are not good for the viewer and in my opinion looks "amateur". Though this, of course, doesn't imply you have to be professional for the thing you were demonstrating, these just got me thinking how familiar were you with Frida to show / teach someone something valuable - which I believe the purpose of this video. I should give your credit by the way, I had minuscule knowledge about the Frida and after watching your video I had a basic understanding how it works (and not). Thanks.
is this some kind of trolling joke? it's a ten minute video and after 2 minutes you neither explained nor demonstrated a single thing. instead you click around in Android Studio and even hit the "Troubleshoot" button to spawn some webbrowser online help.
2:31 I realize the adb wasn't connected and fix it. 3:07 The vulnerable app used in the demo is installed on the emulator 3:47 Overview of the source code of the vulnerable app 6:24 Overview of hook.py & how it dynamically attaches to the app 8:03 Run Frida 8:32 Run hook.py 8:35 App is now dynamic hooked Also thanks for your feedback :)
You did show us if the app was respawn when upload the frida script on the app . You never show us when the app was spawn by frida neither from beginning or the end
Please take my comment as a constructive criticism; do prepare before recording a video. Waiting for the Android Studio to boot up and to load the project, deciding whether or not Frida's server were running are not good for the viewer and in my opinion looks "amateur". Though this, of course, doesn't imply you have to be professional for the thing you were demonstrating, these just got me thinking how familiar were you with Frida to show / teach someone something valuable - which I believe the purpose of this video. I should give your credit by the way, I had minuscule knowledge about the Frida and after watching your video I had a basic understanding how it works (and not). Thanks.
You could just skip to where u need instead of whining like a little mongol
Why do I have error( "TypeError: not a function" ) every time I use anyFunctionName.implementation = function () {....
Can you upload the demo apk and the related files so that it will be easy for practice
6:36 look u can see the android app package name.
Hackingandroidvulnapp1
How to "crack", if we do not possess a source code?
Was this run on a rooted android device?
Much thanks for the video!
how to fix unexpectedly timed out while waiting for app to launch ? plz help me
script link ?
excellent vid,other commenters are noobs
i want to ask about something can we talk ?
my ig: rez0
is this some kind of trolling joke? it's a ten minute video and after 2 minutes you neither explained nor demonstrated a single thing. instead you click around in Android Studio and even hit the "Troubleshoot" button to spawn some webbrowser online help.
2:31 I realize the adb wasn't connected and fix it.
3:07 The vulnerable app used in the demo is installed on the emulator
3:47 Overview of the source code of the vulnerable app
6:24 Overview of hook.py & how it dynamically attaches to the app
8:03 Run Frida
8:32 Run hook.py
8:35 App is now dynamic hooked
Also thanks for your feedback :)
You did show us if the app was respawn when upload the frida script on the app . You never show us when the app was spawn by frida neither from beginning or the end