Рет қаралды 3,413
#fridadetection #fridabypass #android #pentest #arm64 #mobilesecurity
In this video we are going to learn some new frida detection techniques which requires both static and dynamic analysis. We are going to use radare2 and Ghidra tools as our disassembler to disassemble the binary and extract some insights from it and also understand how application hides some of the implementation using stealthy techiques.
To be precise we are going to learn:
1. Port based frida detection
2. Frida artifacts based detection
3. libc checksum based frida detection
You can download the sample application from our github repo:
github.com/fatalSec/android_i...
Consider subscribing to the channel and also hit the like button.
Stay connected with us on:
Telegram: t.me/SecFatal
X: / secfatal