Bypassing advance frida detections using Frida

Поделиться
HTML-код
  • Опубликовано: 23 янв 2025

Комментарии • 22

  • @1337devil
    @1337devil Год назад +4

    Great content, and yes it's better to explain everything indepth. thank you

  • @beluga8569
    @beluga8569 Год назад +1

    I must say, a very interesting topic. Previously, I myself was deeply immersed in it, not without your help. Now I'm immersed in studying GAS assembler, but it was nice to remember that time

    • @fatalsec
      @fatalsec  Год назад

      Could you tell me more about GAS assembler?

    • @beluga8569
      @beluga8569 Год назад

      @@fatalsec
      What specifically would you like to hear about? Assembly language is a very broad topic

  • @niveditasharma2173
    @niveditasharma2173 Год назад

    Very well explained as always. Looking forward for more interesting videos.

  • @leonjeon6206
    @leonjeon6206 Год назад +1

    How did you know you needed to add 2 bytes at 12:50, it's not stated on the man page.

    • @fatalsec
      @fatalsec  Год назад +1

      If you look at the structure of structaddr you will notice that the first field is of type sa_family_t which is short unsigned integer which takes 2bytes.

  • @berkedel
    @berkedel Год назад

    as always, awesome content. thank you

  • @aliaboahmad8430
    @aliaboahmad8430 Год назад

    Great content keep it on❤

  • @mohammedeldawody...6165
    @mohammedeldawody...6165 10 месяцев назад

    Thank you for the great video! unfortunally I had a problem. whenever I edit libc.so in the maps file, I get errors

  • @ayushmauryars
    @ayushmauryars 10 месяцев назад

    We Indians are going to be the next generation cyber security

  • @serhatomerrencber752
    @serhatomerrencber752 11 месяцев назад

    you are good !

  • @hassana1031
    @hassana1031 3 месяца назад

    hi, great video, i have an apk it has , root detection, frida detection and sslpinning, can you help me with that please?

  • @phaneedrakumaribharadwaj2392
    @phaneedrakumaribharadwaj2392 3 месяца назад

    Wonderful content want to connect with you

    • @fatalsec
      @fatalsec  3 месяца назад

      You can connect with me on telegram by joining our group t.me/SecFatal

  • @ayushmauryars
    @ayushmauryars 10 месяцев назад +2

    Bro please don't skip. And please don't go for noobs who don't like theories. But personally I live theories and analysis very much because if tomorrow things change, then you can't repeat a process until you know how it works. So please continue explanation😢

  • @piortiq9795
    @piortiq9795 Год назад +1

    Isnt stupid to create custom frida checks applications and then just bypass your own system?

    • @fatalsec
      @fatalsec  Год назад +9

      The objective is to educate on the techniques discussed in this video, not to demonstrate ways to bypass other applications' protections.

    • @bhavik_kanejiya
      @bhavik_kanejiya Год назад

      Asking such questions may makes you stupid🥰