Bypassing Frida detection in Android

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024
  • #frida #rootdetection #fridadetection #android #pentest #r2pay
    Hello everyone, in this video we are going to learn some new techniques which are used in android app for detecting frida based on some frida artifacts in the memory and filesystem.
    For learning purpose we have used the application from MSTG crackme i.e r2pay.
    You can download this app directly from their github page: github.com/OWA...
    It has lot of detections like root detection, frida detection, hook detection for protecting the app from being reversed. This app uses libc functions to detect 2 artifacts one is "/proc/self/task/*/status" and the other is "/proc/self/fd/*".
    As always feel free to comment down below in case you have any queries and i will reply as soon as i can.
    Also, dont forget to hit a like button and subscribe to this channel to show your support. You can also follow us on twitter at @SecFatal.

Комментарии • 71

  • @souravrouth5333
    @souravrouth5333 8 месяцев назад +1

    Best Frida tutorial I have found till this date. Loved it. Please make more videos on Frida

  • @Fuddifadu
    @Fuddifadu Год назад +4

    Awesome info, looking forward to your next video! Already subscribed!

    • @fatalsec
      @fatalsec  Год назад +2

      Thanks for the sub!

    • @ochacora3239
      @ochacora3239 7 месяцев назад

      ​@@fatalsecsir, can you make video why we can't inject Frida gadget in it..

  • @abhishekbandivadekar3999
    @abhishekbandivadekar3999 Год назад +2

    Would be really helpful if you could share resources to get deeper understanding of this. How to use Frida apis and stuff.

    • @fatalsec
      @fatalsec  Год назад +1

      You can get started with this resource it’s very good and useful.
      learnfrida.info

  • @mhamademad
    @mhamademad Год назад +3

    upload more quality content, subscribed / liked

    • @fatalsec
      @fatalsec  Год назад

      Thanks, sure more contents are coming soon.

  • @FINANCEASSESSORIA-v5y
    @FINANCEASSESSORIA-v5y 3 месяца назад +1

    Hi brother, Have you seen this error in Frida? "Failed to enumerate processes: unable to run ptrace pokedata: I/O"

    • @fatalsec
      @fatalsec  3 месяца назад +1

      Are you using a custom rom?

    • @FINANCEASSESSORIA-v5y
      @FINANCEASSESSORIA-v5y 3 месяца назад

      @@fatalsec Yes, android 14 - motorola g53

    • @FINANCEASSESSORIA-v5y
      @FINANCEASSESSORIA-v5y 3 месяца назад

      @@fatalsec
      I would like private mentoring, how can I get in touch?

  • @still_alive02
    @still_alive02 8 месяцев назад

    This is physical rooted device? I've heard frida doesn't works normally with emulators

  • @kishorbal8070
    @kishorbal8070 Год назад +1

    Hy bruh ..that was sooo good like your all other videos, Btw i would like to know what should i refer for making my own custom frida scripts?? As of now,all i do is just copying someone else' scripts from internet..😂.. I just wanted make my own frida scripts (I have the basics of JS coding). Also i would suggest you to share the frida scripts that you are making for your videos, just under their description section.

    • @fatalsec
      @fatalsec  Год назад

      Hi, thanks for the suggestion. I have already started maintaining a repository:
      github.com/fatalSec

  • @berkedel
    @berkedel Год назад +3

    Good presentation. Looking forward for next content

    • @fatalsec
      @fatalsec  Год назад +1

      Thanks for your feedback.

  • @wojiaowangjiaming
    @wojiaowangjiaming 5 месяцев назад

    Hey! Awesome videos thanks ! I’m trying to adapt your method on other apps unfortunately I’m not able to see the lib where the error come from, I don’t have the same stack trace as yours. Mine is juste Java runtime stuff and i don’t have the backtrace at the end for example. Do you have any clues why ?

    • @fatalsec
      @fatalsec  5 месяцев назад +1

      Hi, this could be because there are no native libraries present in the app and the detection is being done on the java layer itself. You can use the Process.setExceptionHandler() to catch exceptions and backtrace from there.

  • @kaushalbhardwaj3969
    @kaushalbhardwaj3969 2 месяца назад

    Fantastic video. Thanks🙏

  • @methadonmanfred2787
    @methadonmanfred2787 Год назад

    unfortunatly this doesnt work for all apps. frida is still being detected

    • @fatalsec
      @fatalsec  Год назад

      Yes, there are many ways to detect frida and every app is different. Until unless they are using the same protection libraries. So you have to understand the concept and work your way through it.

  • @sumitKumar-pf9xo
    @sumitKumar-pf9xo Год назад +3

    Great informative video

  • @asadakhlaq1298
    @asadakhlaq1298 Год назад +1

    Thankyou ! For sharing the knowledge.

  • @ontheweek559
    @ontheweek559 Год назад +1

    Please upload more about Frida...

    • @fatalsec
      @fatalsec  Год назад +2

      Sure, more videos are coming soon.

  • @KundonGautam
    @KundonGautam 9 месяцев назад

    sir do you have your own courses for your videos or only release here in youtube

    • @fatalsec
      @fatalsec  9 месяцев назад

      No courses yet. But I do provide one to one trainings. If you are interested you can contact me on: secfatal@proton.me

    • @kundangautam6528
      @kundangautam6528 9 месяцев назад

      @@fatalsec i have left you a message sir

  • @P0K0
    @P0K0 Год назад +2

    Keep the good work

  • @ananthakrishnaner9807
    @ananthakrishnaner9807 Год назад +2

    Well presented 😊

  • @rachitbedi1
    @rachitbedi1 Год назад

    Hi can you share the frida detection logic used in the app

    • @fatalsec
      @fatalsec  Год назад

      You mean the java/native code used to detect the logic?

    • @rachitbedi1
      @rachitbedi1 Год назад

      @@fatalsec yeah the logic you are trying to bypass

  • @LEGENDSAHILL
    @LEGENDSAHILL Год назад

    Very useful video sir ............ Can you kill resso manually latest version

    • @fatalsec
      @fatalsec  Год назад

      You can connect with me on telegram to discuss more in detail. Are you on telegram?

    • @LEGENDSAHILL
      @LEGENDSAHILL Год назад

      @@fatalsec yes

  • @AkshayJain-fr3hf
    @AkshayJain-fr3hf Год назад +3

    Amazing video :)

  • @BeBarOfficial
    @BeBarOfficial Год назад +2

    very helpful

  • @alissonbezerra7
    @alissonbezerra7 Год назад +2

    Very good, my friend.

  • @kurdm1482
    @kurdm1482 Год назад +2

    super fucking sueful thanks a ton

  • @AliJujara-e2x
    @AliJujara-e2x Год назад

    What is the android version of the emulator ?

    • @fatalsec
      @fatalsec  Год назад

      This is google pixel 4 running android 11.

    • @AliJujara-e2x
      @AliJujara-e2x Год назад

      @@fatalsec Thank you, can you share your telegram ID?

  • @BeBarOfficial
    @BeBarOfficial Год назад

    Can it crack anti frida libdexprotector?

    • @fatalsec
      @fatalsec  Год назад

      Well not out of the box. I am sure there are other checks as well in libdexprptector. You can try using these techniques and try to bypass.

    • @BeBarOfficial
      @BeBarOfficial Год назад +1

      Yes libxexrpotector checks on the cmdline, I tried the hex patch on the frida server lib tried to change the main name entered on the cmdline and it worked, so in conclusion the check is on the cmdline, but the lib is obscured so it's difficult.

    • @BeBarOfficial
      @BeBarOfficial Год назад

      @@fatalsec Can we continue chatting on telegram?

    • @fatalsec
      @fatalsec  Год назад

      Yes, let me know your telegram ID I will ping you.

    • @BeBarOfficial
      @BeBarOfficial Год назад

      @@fatalsec @ibadifal

  • @akki6094
    @akki6094 Год назад +2

    Amazing 🤩

  • @exploitplays3835
    @exploitplays3835 Год назад

    Is this mobxeler u r using?

    • @fatalsec
      @fatalsec  Год назад +1

      No, it’s my own customised Kali machine

  • @halshs1790
    @halshs1790 Год назад +1

    Learn Course full Frida for android

  • @trantrungkien2790
    @trantrungkien2790 Год назад

    amazing content i love it

    • @fatalsec
      @fatalsec  Год назад +1

      Thank you! More content is on the way. Stay tuned.

  • @jayedsadiq
    @jayedsadiq Год назад

    Bro it shows failed to spawn: need gadget to attach with jailed Android. What should i do??

    • @fatalsec
      @fatalsec  Год назад

      It seems your frida server is not running on the device. Make sure that frida server is running as root.

    • @jayedsadiq
      @jayedsadiq Год назад

      @@fatalsec drive.google.com/file/d/1kbnsXhj5iNIOrOfqcnLR35HOMrFGX_6S/view?usp=drivesdk here is the problem bro. I have installed server&gadget both on the emulator /data/local/tmp and granted chmod permission. But still facing the problem.

  • @ayushmauryars
    @ayushmauryars 8 месяцев назад

    Bro you're Indian na?

  • @trickshindi100
    @trickshindi100 Год назад

    Bhai Please Hindi Me Video Banao.... 😭 English Barrier ban chuki hai coding sikhne me.

    • @fatalsec
      @fatalsec  Год назад

      Jarur bhai kyu nahi! Hindi me b start karenge jaldi.

  • @mistake262
    @mistake262 Год назад

    Accha😁😆😁😆😁😆😁😆😁😆😁

  • @ayaanalam4217
    @ayaanalam4217 Год назад

    At backtrace it showing /system/lib/libhoudini[dot]so and also it showing nothing on interceptor script after executing I am using genymotion emulator android 8 and Frida 16.0.8

    • @ayaanalam4217
      @ayaanalam4217 Год назад

      Can I connect with you on telegram?

    • @fatalsec
      @fatalsec  Год назад

      It might be possible that the app is having emulator detection and when you are running it in emulator that detection is causing this crash, but I cannot say much without looking at the complete backtrace.

    • @ayaanalam4217
      @ayaanalam4217 Год назад

      I can share full backtrace can I connect with you in telegram?