Android Pen-testing - Dynamic hooking with Frida

  Рет қаралды 33,988

BitsPlease

BitsPlease

Күн бұрын

Пікірлер: 16
@ozanmuyes
@ozanmuyes 3 жыл бұрын
Please take my comment as a constructive criticism; do prepare before recording a video. Waiting for the Android Studio to boot up and to load the project, deciding whether or not Frida's server were running are not good for the viewer and in my opinion looks "amateur". Though this, of course, doesn't imply you have to be professional for the thing you were demonstrating, these just got me thinking how familiar were you with Frida to show / teach someone something valuable - which I believe the purpose of this video. I should give your credit by the way, I had minuscule knowledge about the Frida and after watching your video I had a basic understanding how it works (and not). Thanks.
@angryman9333
@angryman9333 Жыл бұрын
You could just skip to where u need instead of whining like a little mongol
@suhin8675
@suhin8675 4 жыл бұрын
Can you upload the demo apk and the related files so that it will be easy for practice
@angryman9333
@angryman9333 Жыл бұрын
6:36 look u can see the android app package name. Hackingandroidvulnapp1
@Alek5andr
@Alek5andr 2 жыл бұрын
How to "crack", if we do not possess a source code?
@_SkyDancer
@_SkyDancer 2 жыл бұрын
Why do I have error( "TypeError: not a function" ) every time I use anyFunctionName.implementation = function () {....
@angelxav1
@angelxav1 Жыл бұрын
Was this run on a rooted android device? Much thanks for the video!
@aviiwh2209
@aviiwh2209 3 жыл бұрын
how to fix unexpectedly timed out while waiting for app to launch ? plz help me
@belemnorte5192
@belemnorte5192 2 жыл бұрын
script link ?
@luckish345
@luckish345 4 жыл бұрын
is this some kind of trolling joke? it's a ten minute video and after 2 minutes you neither explained nor demonstrated a single thing. instead you click around in Android Studio and even hit the "Troubleshoot" button to spawn some webbrowser online help.
@BitsPlease
@BitsPlease 4 жыл бұрын
2:31 I realize the adb wasn't connected and fix it. 3:07 The vulnerable app used in the demo is installed on the emulator 3:47 Overview of the source code of the vulnerable app 6:24 Overview of hook.py & how it dynamically attaches to the app 8:03 Run Frida 8:32 Run hook.py 8:35 App is now dynamic hooked Also thanks for your feedback :)
@EmmyEmmy-o1u
@EmmyEmmy-o1u 2 ай бұрын
You did show us if the app was respawn when upload the frida script on the app . You never show us when the app was spawn by frida neither from beginning or the end
@vipulnair8867
@vipulnair8867 4 жыл бұрын
excellent vid,other commenters are noobs
@محمدالحربي-د6ب
@محمدالحربي-د6ب 3 жыл бұрын
i want to ask about something can we talk ? my ig: rez0
Android Pen-testing - Debugging using Andbug and JDB
12:41
BitsPlease
Рет қаралды 4 М.
Hooking Java Methods with Frida
29:04
LaurieWired
Рет қаралды 19 М.
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 18 МЛН
To Brawl AND BEYOND!
00:51
Brawl Stars
Рет қаралды 16 МЛН
УДИВИЛ ВСЕХ СВОИМ УХОДОМ!😳 #shorts
00:49
Hacking Android Apps with Frida
25:27
sambal0x
Рет қаралды 69 М.
Android Pen-testing - Bypass SSL pinning
17:54
BitsPlease
Рет қаралды 51 М.
Frida Hooking Tutorial - Android Game Hacking
16:10
Guided Hacking
Рет қаралды 36 М.
LevelUp 0x04 - Fun with Frida on Mobile
59:13
Bugcrowd
Рет қаралды 31 М.
Hooking Native Android Methods with Frida
31:44
LaurieWired
Рет қаралды 23 М.
Android Application Pentesting - Mystikcon 2020
56:51
Wise Fox Security
Рет қаралды 70 М.
Cracking Android apps with Frida
30:09
0xFF Sweden
Рет қаралды 38 М.
OBTS v4.0: "iOS Reverse Engineering With Frida" - Christine Fossaceca
43:18
Objective-See Foundation
Рет қаралды 11 М.
Cracking Fun with Frida & Radare: Mobile App & IoT Edition
19:42
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 18 МЛН