Bypassing Frida detection in Android

Поделиться
HTML-код
  • Опубликовано: 27 окт 2024

Комментарии • 71

  • @souravrouth5333
    @souravrouth5333 8 месяцев назад +1

    Best Frida tutorial I have found till this date. Loved it. Please make more videos on Frida

  • @Fuddifadu
    @Fuddifadu Год назад +4

    Awesome info, looking forward to your next video! Already subscribed!

    • @fatalsec
      @fatalsec  Год назад +2

      Thanks for the sub!

    • @ochacora3239
      @ochacora3239 7 месяцев назад

      ​@@fatalsecsir, can you make video why we can't inject Frida gadget in it..

  • @mhamademad
    @mhamademad Год назад +3

    upload more quality content, subscribed / liked

    • @fatalsec
      @fatalsec  Год назад

      Thanks, sure more contents are coming soon.

  • @kishorbal8070
    @kishorbal8070 Год назад +1

    Hy bruh ..that was sooo good like your all other videos, Btw i would like to know what should i refer for making my own custom frida scripts?? As of now,all i do is just copying someone else' scripts from internet..😂.. I just wanted make my own frida scripts (I have the basics of JS coding). Also i would suggest you to share the frida scripts that you are making for your videos, just under their description section.

    • @fatalsec
      @fatalsec  Год назад

      Hi, thanks for the suggestion. I have already started maintaining a repository:
      github.com/fatalSec

  • @berkedel
    @berkedel Год назад +3

    Good presentation. Looking forward for next content

    • @fatalsec
      @fatalsec  Год назад +1

      Thanks for your feedback.

  • @abhishekbandivadekar3999
    @abhishekbandivadekar3999 Год назад +2

    Would be really helpful if you could share resources to get deeper understanding of this. How to use Frida apis and stuff.

    • @fatalsec
      @fatalsec  Год назад +1

      You can get started with this resource it’s very good and useful.
      learnfrida.info

  • @wojiaowangjiaming
    @wojiaowangjiaming 4 месяца назад

    Hey! Awesome videos thanks ! I’m trying to adapt your method on other apps unfortunately I’m not able to see the lib where the error come from, I don’t have the same stack trace as yours. Mine is juste Java runtime stuff and i don’t have the backtrace at the end for example. Do you have any clues why ?

    • @fatalsec
      @fatalsec  4 месяца назад +1

      Hi, this could be because there are no native libraries present in the app and the detection is being done on the java layer itself. You can use the Process.setExceptionHandler() to catch exceptions and backtrace from there.

  • @FINANCEASSESSORIA-v5y
    @FINANCEASSESSORIA-v5y 2 месяца назад +1

    Hi brother, Have you seen this error in Frida? "Failed to enumerate processes: unable to run ptrace pokedata: I/O"

    • @fatalsec
      @fatalsec  2 месяца назад +1

      Are you using a custom rom?

    • @FINANCEASSESSORIA-v5y
      @FINANCEASSESSORIA-v5y 2 месяца назад

      @@fatalsec Yes, android 14 - motorola g53

    • @FINANCEASSESSORIA-v5y
      @FINANCEASSESSORIA-v5y 2 месяца назад

      @@fatalsec
      I would like private mentoring, how can I get in touch?

  • @still_alive02
    @still_alive02 7 месяцев назад

    This is physical rooted device? I've heard frida doesn't works normally with emulators

  • @AkshayJain-fr3hf
    @AkshayJain-fr3hf Год назад +3

    Amazing video :)

  • @asadakhlaq1298
    @asadakhlaq1298 Год назад +1

    Thankyou ! For sharing the knowledge.

  • @kaushalbhardwaj3969
    @kaushalbhardwaj3969 Месяц назад

    Fantastic video. Thanks🙏

  • @KundonGautam
    @KundonGautam 8 месяцев назад

    sir do you have your own courses for your videos or only release here in youtube

    • @fatalsec
      @fatalsec  8 месяцев назад

      No courses yet. But I do provide one to one trainings. If you are interested you can contact me on: secfatal@proton.me

    • @kundangautam6528
      @kundangautam6528 8 месяцев назад

      @@fatalsec i have left you a message sir

  • @methadonmanfred2787
    @methadonmanfred2787 Год назад

    unfortunatly this doesnt work for all apps. frida is still being detected

    • @fatalsec
      @fatalsec  Год назад

      Yes, there are many ways to detect frida and every app is different. Until unless they are using the same protection libraries. So you have to understand the concept and work your way through it.

  • @P0K0
    @P0K0 Год назад +2

    Keep the good work

  • @alissonbezerra7
    @alissonbezerra7 Год назад +2

    Very good, my friend.

  • @sumitKumar-pf9xo
    @sumitKumar-pf9xo Год назад +3

    Great informative video

  • @LEGENDSAHILL
    @LEGENDSAHILL Год назад

    Very useful video sir ............ Can you kill resso manually latest version

    • @fatalsec
      @fatalsec  Год назад

      You can connect with me on telegram to discuss more in detail. Are you on telegram?

    • @LEGENDSAHILL
      @LEGENDSAHILL Год назад

      @@fatalsec yes

  • @ananthakrishnaner9807
    @ananthakrishnaner9807 Год назад +2

    Well presented 😊

  • @ontheweek559
    @ontheweek559 Год назад +1

    Please upload more about Frida...

    • @fatalsec
      @fatalsec  Год назад +2

      Sure, more videos are coming soon.

  • @akki6094
    @akki6094 Год назад +2

    Amazing 🤩

  • @BeBarOfficial
    @BeBarOfficial Год назад +2

    very helpful

  • @AliJujara-e2x
    @AliJujara-e2x Год назад

    What is the android version of the emulator ?

    • @fatalsec
      @fatalsec  Год назад

      This is google pixel 4 running android 11.

    • @AliJujara-e2x
      @AliJujara-e2x Год назад

      @@fatalsec Thank you, can you share your telegram ID?

  • @rachitbedi1
    @rachitbedi1 Год назад

    Hi can you share the frida detection logic used in the app

    • @fatalsec
      @fatalsec  Год назад

      You mean the java/native code used to detect the logic?

    • @rachitbedi1
      @rachitbedi1 Год назад

      @@fatalsec yeah the logic you are trying to bypass

  • @exploitplays3835
    @exploitplays3835 Год назад

    Is this mobxeler u r using?

    • @fatalsec
      @fatalsec  Год назад +1

      No, it’s my own customised Kali machine

  • @kurdm1482
    @kurdm1482 Год назад +2

    super fucking sueful thanks a ton

  • @BeBarOfficial
    @BeBarOfficial Год назад

    Can it crack anti frida libdexprotector?

    • @fatalsec
      @fatalsec  Год назад

      Well not out of the box. I am sure there are other checks as well in libdexprptector. You can try using these techniques and try to bypass.

    • @BeBarOfficial
      @BeBarOfficial Год назад +1

      Yes libxexrpotector checks on the cmdline, I tried the hex patch on the frida server lib tried to change the main name entered on the cmdline and it worked, so in conclusion the check is on the cmdline, but the lib is obscured so it's difficult.

    • @BeBarOfficial
      @BeBarOfficial Год назад

      @@fatalsec Can we continue chatting on telegram?

    • @fatalsec
      @fatalsec  Год назад

      Yes, let me know your telegram ID I will ping you.

    • @BeBarOfficial
      @BeBarOfficial Год назад

      @@fatalsec @ibadifal

  • @trantrungkien2790
    @trantrungkien2790 Год назад

    amazing content i love it

    • @fatalsec
      @fatalsec  Год назад +1

      Thank you! More content is on the way. Stay tuned.

  • @halshs1790
    @halshs1790 Год назад +1

    Learn Course full Frida for android

  • @ayushmauryars
    @ayushmauryars 7 месяцев назад

    Bro you're Indian na?

  • @jayedsadiq
    @jayedsadiq Год назад

    Bro it shows failed to spawn: need gadget to attach with jailed Android. What should i do??

    • @fatalsec
      @fatalsec  Год назад

      It seems your frida server is not running on the device. Make sure that frida server is running as root.

    • @jayedsadiq
      @jayedsadiq Год назад

      @@fatalsec drive.google.com/file/d/1kbnsXhj5iNIOrOfqcnLR35HOMrFGX_6S/view?usp=drivesdk here is the problem bro. I have installed server&gadget both on the emulator /data/local/tmp and granted chmod permission. But still facing the problem.

  • @trickshindi100
    @trickshindi100 Год назад

    Bhai Please Hindi Me Video Banao.... 😭 English Barrier ban chuki hai coding sikhne me.

    • @fatalsec
      @fatalsec  Год назад

      Jarur bhai kyu nahi! Hindi me b start karenge jaldi.

  • @mistake262
    @mistake262 Год назад

    Accha😁😆😁😆😁😆😁😆😁😆😁

  • @ayaanalam4217
    @ayaanalam4217 Год назад

    At backtrace it showing /system/lib/libhoudini[dot]so and also it showing nothing on interceptor script after executing I am using genymotion emulator android 8 and Frida 16.0.8

    • @ayaanalam4217
      @ayaanalam4217 Год назад

      Can I connect with you on telegram?

    • @fatalsec
      @fatalsec  Год назад

      It might be possible that the app is having emulator detection and when you are running it in emulator that detection is causing this crash, but I cannot say much without looking at the complete backtrace.

    • @ayaanalam4217
      @ayaanalam4217 Год назад

      I can share full backtrace can I connect with you in telegram?