Android Root Detection Bypass (Frida Hooking and APK Patching)

  Рет қаралды 24,400

Intigriti

Intigriti

Күн бұрын

Пікірлер: 38
@vontomebit5775
@vontomebit5775 2 ай бұрын
Finally I found an explanation for my problem. I was having trouble installing Frida and I couldn't run it. This is how I got around it, thanks to you. Thank you.
@intigriti
@intigriti 2 ай бұрын
Happy to help! 😊
@vontomebit5775
@vontomebit5775 2 ай бұрын
@intigriti I encountered another error Failed to enumerate processes: unable to find process with name 'system_server' 😅I searched for it, but it turned out that it needs to be modified, and this is difficult. Many people suffer from this defect. If you look at it, sir, its modification is mentioned on the development site, but it is not understood except by developers. 😅
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
Very nice work dude!
@intigriti
@intigriti Жыл бұрын
🙏🥰
@pwnhun73r
@pwnhun73r 11 ай бұрын
Amazing content, great explanation!! are you running ADV inside parrot vm with nested virtualization? What spec have the vm? Im trying but sometime i have some issues and lag when is running.
@intigriti
@intigriti 11 ай бұрын
Thank you! I do indeed, it's pretty slow even with the 32gb of RAM I have assigned to the VM lol. It's usable though..
@pwnhun73r
@pwnhun73r 11 ай бұрын
@@intigriti Thank you!!
@jruiz1951
@jruiz1951 Жыл бұрын
Hi very nice video, do have any video on how to sniff a Android apk that blocks the vpn sniffer and thanks.
@muhammedibrahimtekin109
@muhammedibrahimtekin109 Жыл бұрын
Is it reliable to use Magisk modules to bypass root detection? And is it possible to pass safetynet with frida without magisk?
@intigriti
@intigriti Жыл бұрын
On Magisk, I guess this would depend on the method of root detection used, e.g. the InsecureBankV2 app uses simple string pattern matching, looking for the name of superuser related apk and functions. It's worth saying that bypassing root detection is generally out of scope in bug bounty, e.g. from the itsme BB program: "Bypassing Root- or Hook-detection on Android is currently out-of-scope". The main reason for demonstrating root detection and bypass in these videos is a) it's a good way to learn about patching APKs and dynamic tools like frida and b) the insecure app has root detection bypass built in as one of it's challenges 🙂
@mnamahania8919
@mnamahania8919 Ай бұрын
Failed to enumerate processes: unable to find process with name 'system_server'
@intigriti
@intigriti Ай бұрын
😕
@Keerthuvinay
@Keerthuvinay 9 ай бұрын
Any solution for zygisk with magisk
@brs2379
@brs2379 7 ай бұрын
How donwe bypass sslpinning, please? Do you have a video on that?
@intigriti
@intigriti 7 ай бұрын
Hey, some of the techniques used in these videos (e.g. Frida hooking) can be used for SSL cert pinning bypass, check this: infosecwriteups.com/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29
@MrAndroid8
@MrAndroid8 Жыл бұрын
thanks i need to talk to you about thing, How do I contact you?
@intigriti
@intigriti Жыл бұрын
Hey, you can join our discord if you want to ask the community questions - go.intigriti.com/discord
@TechnicalFaisal
@TechnicalFaisal Жыл бұрын
Hi can you bypass apk which i will give you bcz i cannot do this if it is possible i can pay for it
@intigriti
@intigriti Жыл бұрын
This isn't something we'd be able to help with, sorry!
@shazilrao2606
@shazilrao2606 Жыл бұрын
Nice 👍
@intigriti
@intigriti Жыл бұрын
Thanks ✌
@EbenezerGmeskel
@EbenezerGmeskel 11 күн бұрын
Does bypassing root detection gets bounty
@intigriti
@intigriti 10 күн бұрын
Need to check the scope/program info, but I believe this is typically out of scope in bug bounty.
@PapitoDios
@PapitoDios Жыл бұрын
Please send links to download apps!
@intigriti
@intigriti Жыл бұрын
All links are in the description! 😉
@Dultimatej
@Dultimatej Жыл бұрын
Do you have a telegram channel. I need to send you some screenshots of by bypass detector
@intigriti
@intigriti Жыл бұрын
There is an intigriti telegram channel but it's not very active, we normally use it around conferences. You can join our discord though: go.intigriti.com/discord
@azefanas
@azefanas Ай бұрын
Can you make mumuplayer 12 undetected? On a mobile game, it's detected, but if I use the mumuplayer nebula (old version), it's not.. I don't get it I've deleted both su files but doesn't do anything
@DarkLotusKDB
@DarkLotusKDB Жыл бұрын
Termux | Automatically Start Frida Server on Rooted Android Phones | Easily Switch Between Version: kzbin.info/www/bejne/qaWpqqecaL54fpI
@odirachukwuonyejefu4034
@odirachukwuonyejefu4034 Жыл бұрын
Thank you sir for this awesome tutorial, please what did you install to run this command? => type -a extract and => extract Please show me how you can extract multiple file extension with one command according to 07:14 - 07:29 Show me everything I need to install to make it work like yours.
@intigriti
@intigriti Жыл бұрын
Hey, thanks mate! For your question: "type -a extract" shows you the bash alias (shortcut) that I have mapped to the "extract" command. You can check here for the full list of bash aliases I use: github.com/Crypto-Cat/CTF/blob/main/my_bash_aliases.md 😊
@m7mdyasin722
@m7mdyasin722 4 ай бұрын
are you cryptocat ????
@intigriti
@intigriti 4 ай бұрын
yes!! 😺👋
Weak Authentication [InsecureBankv2 APK]
9:42
Intigriti
Рет қаралды 4 М.
Frida Hooking Tutorial - Android Game Hacking
16:10
Guided Hacking
Рет қаралды 39 М.
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
Bypassing Multiple Defenses in Android | Frida and Objection
7:39
AI Is Making You An Illiterate Programmer
27:22
ThePrimeTime
Рет қаралды 122 М.
How to bypass root detection using Frida in Android
15:36
FatalSec
Рет қаралды 13 М.
Android App Bug Bounty Secrets
20:14
LiveOverflow
Рет қаралды 108 М.
Bypass Biometrics in Mobile Apps
9:55
CorSecure
Рет қаралды 3,4 М.
Hooking Java Methods with Frida
29:04
LaurieWired
Рет қаралды 21 М.