Это видео недоступно.
Сожалеем об этом.

Hooking Native Android Methods with Frida

Поделиться
HTML-код
  • Опубликовано: 5 авг 2024
  • In this video, we use Frida hooking to intercept native Android methods after they have been loaded into the runtime. We write a custom script that uses Interceptor.attach to run code when the native method is invoked.
    ---
    Timestamps:
    00:00 Intro
    00:50 Grabbing Sample
    01:32 Looking at Native Libs
    02:51 Emulation Time!
    06:10 Attaching Frida
    07:36 Enumerating Imports and Exports
    09:45 Scripting
    16:05 Intercepting Native Binary
    20:20 Explaining the Interceptor
    22:20 Exploring Method Names in Ghidra
    25:30 Running with Hooking Script
    28:05 Method order is Important!
    30:06 One more time!
    30:45 Recap
    ---
    Links Mentioned in Video:
    Frida:
    github.com/frida/frida
    Redroid:
    github.com/remote-android/red...
    Scrcpy:
    github.com/Genymobile/scrcpy
    ---
    Malware Examined in the video (Xloader):
    sha256:ada2808ef254c39e70f74c93c7fd3b7f458ea439beebfc1520650fd0e3e34990
    MalwareBazaar Link:
    bazaar.abuse.ch/sample/ada280...
    ---
    laurieWIRED Twitter:
    / lauriewired
    laurieWIRED Website:
    lauriewired.com
    laurieWIRED Github:
    github.com/LaurieWired
    laurieWIRED HN:
    news.ycombinator.com/user?id=...
    laurieWIRED Reddit:
    / lauriewired

Комментарии • 43

  • @lxma
    @lxma Год назад +5

    awesome video, thanks for sharing! all of your videos have great production quality and are really informative. you deserve way more subscribers!

  • @PixelHamster
    @PixelHamster Год назад +2

    Thanks these videos were incredibly helpful

  • @itshoitshoify
    @itshoitshoify 8 месяцев назад

    Great content. Thank you! 👍🏻

  • @rokis2011
    @rokis2011 5 месяцев назад

    thanks for explaining, good vids. Keep up

  • @sudoalex
    @sudoalex 8 месяцев назад +1

    Underrated video 🎉

  • @Me.n_n
    @Me.n_n Год назад +1

    Great ❤,,more videos like this 😊

  • @katonurlap
    @katonurlap Год назад

    Love your vids :3

  • @user-cr9ix2mg5u
    @user-cr9ix2mg5u Год назад +4

    cool vid! can this be used for windows java applications/games to hook interpreted/compiled methods as well from a c++ dll? (using frida C api)

  • @0xPanda1
    @0xPanda1 3 месяца назад

    Thank u very informative

  • @叵
    @叵 Год назад +1

    Hello,
    Do you know if it is possible to inject a WebView (or any other type of GUI) inside the Frida script so the user of the modified version will be able to change values of hooked functions when the APK is built using Objection?

  • @mahdivazhir1834
    @mahdivazhir1834 4 месяца назад

    Very good thanks

  • @hollowgroundxX
    @hollowgroundxX 2 месяца назад

    Your reverse engineering videos are very informative. Ty 🙏

  • @user-vl8eo4pr4w
    @user-vl8eo4pr4w 6 месяцев назад

    Hi laurie, thanks for the video.
    enumerateExports is not working(Showing an empty array)
    in my version frida 16.1.10, but it is showing results in your version 16.0.19,, any reason laurie behind this. the same code is not working for me in same 16.0.19 as well.

  • @brunoaduarte
    @brunoaduarte 2 месяца назад

    Hi Laurie! Can you demonstrate when and how to hook the native libraries by the enumerated export addresses you showed at 8:25 ? Love your content! Thanks!

  • @Pixalynx
    @Pixalynx Год назад

    What are those LED lights you have in the background, the ones that change different hues of pink, I want to buy them haha

  • @trifalgarh
    @trifalgarh 11 месяцев назад +1

    Which emulator are you using? Is it Android Studio AVD or is it something else?

  • @BedrijvigeBij
    @BedrijvigeBij 2 месяца назад

    Smart and beautiful

  • @erilycus
    @erilycus 3 месяца назад

    Love❤

  • @brunoaduarte
    @brunoaduarte 2 месяца назад

    And what if a native library is loaded in "stealth mode", I mean, it doesn't show as an enumerated module. But I can see it loaded in memory, how can I attach to it?

  • @Sj-ze5wk
    @Sj-ze5wk Год назад

    Can u do ida native so debugging? I always get sig errors

  • @WorldTimeLineChannel1
    @WorldTimeLineChannel1 4 месяца назад

    Great video Laurie. You are a really bright, smart, beautiful girl. Great stuff.

  • @user-ex9ip7zw9e
    @user-ex9ip7zw9e 6 месяцев назад

    could you help me analyzing an app,it is very difficult

  • @tientoan8157
    @tientoan8157 Год назад

    Can you give me link of your wallpaper? It's very cool

  • @diogocardoso1479
    @diogocardoso1479 24 дня назад

    ...Are you married? hahahaha. Taking the joke away, Congratulations on the video, very good indeed!!! +1Subscribed

  • @tadasturonis
    @tadasturonis Год назад

    I think you slightly misplaced the mayo

  • @paulabrudan7896
    @paulabrudan7896 Год назад +1

    Couldnt you just hook the constructor?

    • @lauriewired
      @lauriewired  Год назад +1

      Sure thing! You could hook many different functions and get similar results. Just preference by situation :)

  • @MrAnhell
    @MrAnhell 10 месяцев назад +1

    Brains and Beauty plus easy to understand.

  • @DebbieMarieClassics
    @DebbieMarieClassics Год назад

    i really like your hair in this video. That's the most technical thing i can say.

  • @moviesynopsis001
    @moviesynopsis001 5 месяцев назад

    More like Laurie Hired!

  • @EugeneM
    @EugeneM 9 месяцев назад

    Such approach works for some scenarios with very simple Android apps. In serious software this hooking gives us nothing as all of the hidden and secured app logic is implemented in native obfuscated code. Android app loads a native lib, then this lib opens some socket and communicates with Android app via that socket using encrypted strings. And when you want to change how native code works the only thing you can do is trying to trace and debug native lib via IDA. And this approach is much more complicated without any guarantee of success.

    • @lauriewired
      @lauriewired  9 месяцев назад +1

      Are you saying that native hooking never helps for real apps? Hard disagree. It won't work for certain apps, but it's super useful in a lot of real-world situations. For example, if you are trying to get by some native anti-emulation.

    • @still_alive02
      @still_alive02 Месяц назад

      static disassembler like ida wont give much btw, needs to take backtrace by frida, if app have antidebugger you have to hook system calls and trace libc, for example hook functions that looks in proc/self/status

    • @Shinika01
      @Shinika01 25 дней назад

      of course for advanced malware the approach wouldn't be "that easy"...
      Don't forget that this video is merely educative to help people understand and progress.

  • @wrathofainz
    @wrathofainz Месяц назад

    Nerdy girls exist: confirmed.
    Now how to meet them...
    I'll bookmark this video as part of my research to crack apks. I've been poking one unity game with the intention of removing vendor-lock.
    The game doesn't work unless installed from (or spoofed) the Google play store.
    It also has some sort of signature check apart from the usual one. Bother.

  • @ayushmauryars
    @ayushmauryars 4 месяца назад

    Will you become my friend 😢 pleasee

  • @Giurigi123
    @Giurigi123 4 месяца назад +7

    i dont understand anything this girl is just looking goood

  • @kingmarwat
    @kingmarwat 10 месяцев назад

    Amazing...... but video is tool long . It can be done in 5 minutes... In your next video, be to the point

  • @AI__VOICE
    @AI__VOICE Год назад +3

    Hey you very attractive 😅 i loos my focus 😂😂😂 of the video topic 😂😂