This is the best vidéo about Frida really thank you for this amazing content. Please come back to YT to make more of these the world needs a teacher like you ! Thanks again !
I may be mistaken, but cant you also use Frida while using mitm proxy and mobsf to accomplish the same results. Alissa Knight states in one of talks that she uses mobsf and mitmproxy with her phone as a hotspot and set to the proxy then if there is ssl pinning she uses Frida to circumvent.
I realize your comment is 9 months old, but I still wanted to answer for anyone else reading this: Yes, that is exactly what happens 9 seconds later in the video (the alert with his replaced text). Afterwards, he replaces the function entirely by a "return null" in order to bypass the alert (so that it doesn't exit the app, even thought it has detected that the device is rooted).
This is the best vidéo about Frida really thank you for this amazing content. Please come back to YT to make more of these the world needs a teacher like you ! Thanks again !
Very detailed video. By watching this video, I was able to bypass root detection in an application I was pentesting. Very awesome
as a chinese, glad to see a senior doing great in security field as I just moved in, great effort! keep it up
I'm also new here. I'm wondering if we could collaborate on some ideas.
@@oseniolamide3188 we going to brief this on email or xmpp?
@@maplessss hi take me too
One of the best vids on this subject. Well done.
I may be mistaken, but cant you also use Frida while using mitm proxy and mobsf to accomplish the same results. Alissa Knight states in one of talks that she uses mobsf and mitmproxy with her phone as a hotspot and set to the proxy then if there is ssl pinning she uses Frida to circumvent.
Very clear explanation, and this make me more understand to test apk. Thank you!
You're an excellent teacher. Thank you.
Thats a great tutorial 🙏 loved it and want more videos for beginner .
Bro explained frida like no other and just vanished :(
This is really a good guide on frida! Thanksss
02:15 dynamic instrumentation 02:45 written in C
Really well explained. Thank you very much
Where are you man ?
i have a question though would this get detected by ids or so? should we conceal anything or do any practices to do it sneakily or no need?
This is worth watching, thank you!
(at 09:20) Why did you call the original this.a function 'this.a(arg1)`? Wouldn't that cause the alert to be displayed and the application to exit?
I realize your comment is 9 months old, but I still wanted to answer for anyone else reading this: Yes, that is exactly what happens 9 seconds later in the video (the alert with his replaced text). Afterwards, he replaces the function entirely by a "return null" in order to bypass the alert (so that it doesn't exit the app, even thought it has detected that the device is rooted).
Hey how did you setup for testing , i have kali on vmware and windows as a main machine ?
very great tutor. waiting for your next videos
Incredible tutorial, please keep it up!
Well done bro 👌👍
Great content, thank you. In a real world scenario, is the decompiler the only route within the methodology?
Well presented bro
What a great tutorial's video bro, 😁
Why do I have error( "TypeError: not a function" ) every time I use anyFunctionName.implementation = function () {....
Awesome video man! but "jailbroken android"?
Basically a rooted one
Hello Bro I Need Some Help
9:44 u could remove `return null` and it still would be the same
Ill subscribed
I would love to make this work with a specific app that detects root on my phone. Any interest in helping me? Tell me how much
Thank you for this video
can u hack mobile game like increase gold in game
Crisp
implementation undefined. can you give solution sir for my error ? thanks
Thanks 🤩🤩🤩
👍👍
Need one Help can We Bypass login of application With the help of this
Could you please help me out with using frida for a game called Wild Rift. And how can i apply to emulator please.
Awesome my guy !
Thanks
how to edit resource.arsc file
Amazing!
How to use burp suite on android
Can you give this ppt file?
thank g
Great Talk !!!
Why I can't play the video
Thank you so much
How to jailbreak android?
method != methodology
def. method: procedure or steps to accomplish a goal.
def. methodology: the _study_ of methods.
♥️👍
how to bypass okhttp3
i just want to get my hacked whastapp account back CAN SOMEONE HELP
How can I find you ?
i'm pretty sure you are explaining right but i do not understand anything