Reverse Engineering Flutter Based Android Applications

Поделиться
HTML-код
  • Опубликовано: 29 ноя 2024

Комментарии • 51

  • @vampire6618
    @vampire6618 28 дней назад +1

    I was struggling for month while trying to work on an Flutter app, until I saw this video! Great job

  • @MeMe-q9t8k
    @MeMe-q9t8k 8 месяцев назад +2

    Woow i was waiting for this kind of video ❤

  • @marinbeslo7841
    @marinbeslo7841 5 месяцев назад +2

    This was awesome! Can't wait for your RE series on Flutter :D

  • @ayushmauryars
    @ayushmauryars 7 месяцев назад +2

    Waited too long for flutter😢 thanks brother❤

    • @fatalsec
      @fatalsec  7 месяцев назад +2

      Yes I know, thanks for waiting.

    • @ayushmauryars
      @ayushmauryars 7 месяцев назад

      @@fatalsec you pro😿♥️

    • @I_imperium
      @I_imperium 6 месяцев назад +1

      😮

  • @StudentOfKnowldge
    @StudentOfKnowldge 6 месяцев назад

    What about dumping 360 protection apps like Yunji 雲集 which is Chinese version og Jnotes?

  • @cryboii657
    @cryboii657 7 месяцев назад +1

    You can make course on UDEMY

    • @fatalsec
      @fatalsec  7 месяцев назад

      Thanks for your suggestion. Noted.

  • @Think.Grow.Do.
    @Think.Grow.Do. 6 месяцев назад

    One key difference between blutter and reflutter which I notice is that, reflutter dumps the offsets with dump.dart file which require the patched app to run , but blutter does this by building a sdk around libapp.so .What are the other key difference between using reflutter and blutter tool.

    • @fatalsec
      @fatalsec  6 месяцев назад

      A major difference in using these tools is the one you mentioned that reflutter patches the libapp.so and requires the apk to be resigned which sometimes can cause problems. Apart from this reflutter automatically patches the certificate pinning check so you don’t have to bother about that.

  • @lemidemesew1256
    @lemidemesew1256 7 месяцев назад +2

    In your next flutter reversing app we would like you to see solving a challenge specifically ssl;-pinning using the above videos methodology.

    • @fatalsec
      @fatalsec  7 месяцев назад +1

      Sounds like a good idea. Noted.

    • @jobianstechie
      @jobianstechie 3 месяца назад

      Bro bypæss SSL pinning using Http toolkit 💯 tested

  • @rohitsoni9325
    @rohitsoni9325 2 месяца назад +1

    Wow! Pretty useful video👏

  • @fraazmohammad
    @fraazmohammad Месяц назад

    Sir meri aap se ek choti se request hai mera ek game hai jo 2012 me lunch hua tha ab wo game nhi chal rha hai please aus ko aaj ke phone ke hisaab se kr dijiye please 😢😢😢😢😢😢😢😢😢😢😢😢

  • @Qbtaumai
    @Qbtaumai 7 месяцев назад +2

    Awesome ❤

  • @bkkedeye
    @bkkedeye 7 месяцев назад +1

    Hello my freind , first thank you for your effort ,
    Secondly, when obfuscation is not done in flutter applications reverse engineering is very easy with blutter ,
    But when obfuscation is used, reverse engineering is complicated , I hope you will find a solution for me to reverse engineer Flutter applications that have been obfuscated

    • @fatalsec
      @fatalsec  7 месяцев назад

      Yes, if you can share any sample application which is having obfuscation then it would be great. I will have a look.
      Also, it’s not just the case with flutter apps. Any app which is heavily obfuscated will cause trouble in reverse engineering.

  • @pubggamer7971
    @pubggamer7971 7 месяцев назад

    Very informative video.
    My thought : we can do it only when a func returning a string.
    Also we need frida so we can not share the app to others?
    Last,(request) can we edit inside Assembly to return our string? By storing our string in an address then load the address and return?
    Like we do in normal apk const-string 😊

    • @fatalsec
      @fatalsec  7 месяцев назад

      No you can hook any type of function irrespective of the function return type.
      And to answer your second question you need to wait for the upcoming Flutter series. 😉

    • @pubggamer7971
      @pubggamer7971 7 месяцев назад

      @@fatalsec i am waiting sir 😁😁😁 please hurry if possible..

    • @sayutizxc
      @sayutizxc 7 месяцев назад

      You can inject frida-gadget and a frida script into the APK, so you can share the app with others without requiring them to have frida installed or a rooted device

    • @pubggamer7971
      @pubggamer7971 7 месяцев назад

      @@sayutizxc that's one method, but some limitation like string length must be same or less, not all string are inside in function call,

    • @sayutizxc
      @sayutizxc 7 месяцев назад

      @@pubggamer7971 Sorry, I don't understand your answer. I replied to this question, 'Also, do we need Frida so we cannot share the app with others?' So, you can actually share the app with others without them having Frida installed. From your answer, I think you're referring to what happens if we have a longer string in the function call. I'm also curious about how to handle that. What if the function returns a string with a length of 5 characters, but we need to change it to more characters, for example, 10 or 20?

  • @almmmalki
    @almmmalki 4 месяца назад

    TypeError: cannon read property ‘shl’ of undefined

  • @I_imperium
    @I_imperium 6 месяцев назад

    Thoughts ob
    Obfuscate flutter apps?

    • @fatalsec
      @fatalsec  6 месяцев назад

      Blutter tool is not able to recover the obfuscated symbols so yes it’s difficult to analyse the obfuscated binary. In such cases you can rely on flutter sdk apis and reverse from there!

    • @I_imperium
      @I_imperium 6 месяцев назад

      @@fatalsec wow flutter sdk apis?
      Where can i learn this.

  • @Cod3rMax
    @Cod3rMax 7 месяцев назад

    Can you do something about unity apps?

    • @fatalsec
      @fatalsec  7 месяцев назад +1

      Yes I can make a tutorial on reversing unity apps if people are interested.

  • @melanesiaspy
    @melanesiaspy 7 месяцев назад

    hello friend, may I know what android emulator you are using?

    • @fatalsec
      @fatalsec  7 месяцев назад

      It’s not an emulator but a real device. I use “scrcpy” to share the screen.

  • @sayutizxc
    @sayutizxc 7 месяцев назад

    Is it possible to modify the assembly code to patch the APK, like we do with Smali?

    • @fatalsec
      @fatalsec  7 месяцев назад

      You mean for flutter apps specifically or for any other native android library?

    • @sayutizxc
      @sayutizxc 7 месяцев назад

      @@fatalsec For the Flutter app, I would like to modify some simple logic, such as changing if-else statements or updating the text displayed in the UI, or perhaps adding a new method to the class and calling it somewhere in the app.

    • @standoffsupport-wx4fr
      @standoffsupport-wx4fr 25 дней назад

      @@fatalsec can we ?

  • @lemidemesew1256
    @lemidemesew1256 7 месяцев назад

    How can we Use this to bypass ssl-pinng on any flutter application?

    • @aymcorporation3456
      @aymcorporation3456 12 дней назад

      You can use reflutter to bypass ssl-pinning any flutter app, even without rooting your physical smartphone.

  • @bruno-devs
    @bruno-devs 7 месяцев назад +1

    teach how to reflutter

    • @fatalsec
      @fatalsec  7 месяцев назад +1

      Noted

    • @NADIL_FF
      @NADIL_FF 7 месяцев назад

      ​@@fatalsecplease teach how to bypass anti virtualapp like this
      github.com/ysrc/AntiVirtualApp

  • @shortvideo2457
    @shortvideo2457 5 месяцев назад

    How to root android emulator...??

  • @Spicey_01
    @Spicey_01 7 месяцев назад

    Epic ❤

  • @shortvideo2457
    @shortvideo2457 5 месяцев назад

    Hello Brother.. how to contact you...

    • @fatalsec
      @fatalsec  5 месяцев назад

      You can connect with us by joining our telegram group: t.me/SecFatal
      Or you can contact us via mail: secfatal@proton.me

    • @shortvideo2457
      @shortvideo2457 5 месяцев назад

      @@fatalsec I want to reverse app... should you

  • @wantedlabelrecords5295
    @wantedlabelrecords5295 3 месяца назад

    you discord please?