Any reasons why my decompilation would look slightly different? Does the java version matter? When I am decompiling, I see mostly single-letter variables. For example "Intrinsics" does not appear anywhere in the codebase. In addition, I get a ton of warning logs where it is removing code blocks. I have tried on both Mac and Linux, replicating your exact process with the same version apk and jadx
FlagSix flag can be obtained by dumping the memory, i didn't have the idea how to make that script, so i just pulled out the flag from the application memory xD
Any reasons why my decompilation would look slightly different? Does the java version matter?
When I am decompiling, I see mostly single-letter variables. For example "Intrinsics" does not appear anywhere in the codebase. In addition, I get a ton of warning logs where it is removing code blocks. I have tried on both Mac and Linux, replicating your exact process with the same version apk and jadx
Have you found solution for that problem?
Yes. Even I have the same kind of code after decompiling. Due to that, I'm not able to run the frida script. Anyone with a solution ?
Awesome as Always! Thank you for your great presentation!
Thank you so much! Glad you enjoyed the Mobile Hacking Workshop! ☕🖥️
FlagSix flag can be obtained by dumping the memory, i didn't have the idea how to make that script, so i just pulled out the flag from the application memory xD
which emulator are you using on linux
Thanks ! pls create more videos on Android app pentest. Android owasp test cases.
Very helpful! Thank you!!
Bro how to determine where to use frida where not?
Great videos !! , Linux distro do you use?
Thank you!! I use Ubuntu. ☕🖥️
Alright....Nice work Dude..Keep sharing...There is info ON Mobile hacking...If You could can You suggest Book! For Intermediate Mobile Hacking
Please have link