Hooking Native Android Methods with Frida

  Рет қаралды 22,871

LaurieWired

LaurieWired

Күн бұрын

Пікірлер: 54
@lxma
@lxma Жыл бұрын
awesome video, thanks for sharing! all of your videos have great production quality and are really informative. you deserve way more subscribers!
@PixelHamster
@PixelHamster Жыл бұрын
Thanks these videos were incredibly helpful
@universaltoons
@universaltoons Жыл бұрын
Hello, Do you know if it is possible to inject a WebView (or any other type of GUI) inside the Frida script so the user of the modified version will be able to change values of hooked functions when the APK is built using Objection?
@sudoalex
@sudoalex Жыл бұрын
Underrated video 🎉
@憂鬱な冒険家
@憂鬱な冒険家 Жыл бұрын
cool vid! can this be used for windows java applications/games to hook interpreted/compiled methods as well from a c++ dll? (using frida C api)
@hollowgroundxX
@hollowgroundxX 5 ай бұрын
Your reverse engineering videos are very informative. Ty 🙏
@rokis2011
@rokis2011 9 ай бұрын
thanks for explaining, good vids. Keep up
@itshoitshoify
@itshoitshoify Жыл бұрын
Great content. Thank you! 👍🏻
@Me.n_n
@Me.n_n Жыл бұрын
Great ❤,,more videos like this 😊
@brunoaduarte
@brunoaduarte 6 ай бұрын
Hi Laurie! Can you demonstrate when and how to hook the native libraries by the enumerated export addresses you showed at 8:25 ? Love your content! Thanks!
@trifalgarh
@trifalgarh Жыл бұрын
Which emulator are you using? Is it Android Studio AVD or is it something else?
@katonurlap
@katonurlap Жыл бұрын
Love your vids :3
@0xPanda1
@0xPanda1 7 ай бұрын
Thank u very informative
@WorldTimeLineChannel1
@WorldTimeLineChannel1 8 ай бұрын
Great video Laurie. You are a really bright, smart, beautiful girl. Great stuff.
@mahdivazhir1834
@mahdivazhir1834 8 ай бұрын
Very good thanks
@Pixalynx
@Pixalynx Жыл бұрын
What are those LED lights you have in the background, the ones that change different hues of pink, I want to buy them haha
@erilycus
@erilycus 7 ай бұрын
Love❤
@pavankrishna-v7g
@pavankrishna-v7g 10 ай бұрын
Hi laurie, thanks for the video. enumerateExports is not working(Showing an empty array) in my version frida 16.1.10, but it is showing results in your version 16.0.19,, any reason laurie behind this. the same code is not working for me in same 16.0.19 as well.
@BedrijvigeBij
@BedrijvigeBij 6 ай бұрын
Smart and beautiful
@Mbro-dq2do
@Mbro-dq2do 3 ай бұрын
Laurie should be a model on top of this. Very talented
@brunoaduarte
@brunoaduarte 6 ай бұрын
And what if a native library is loaded in "stealth mode", I mean, it doesn't show as an enumerated module. But I can see it loaded in memory, how can I attach to it?
@swaren180
@swaren180 2 ай бұрын
I am not an expert - I have an application on my phone, and there is a file containing settings for the application, and I import the file into the application..... I want to use hook to extract those settings... How do I do that? Give me a simple example😭
@2024paradigmshift
@2024paradigmshift 2 ай бұрын
I think being tech savvy is so last year
@tientoan8157
@tientoan8157 Жыл бұрын
Can you give me link of your wallpaper? It's very cool
@tadasturonis
@tadasturonis Жыл бұрын
I think you slightly misplaced the mayo
@user-ex9ip7zw9e
@user-ex9ip7zw9e 10 ай бұрын
could you help me analyzing an app,it is very difficult
@paulabrudan7896
@paulabrudan7896 Жыл бұрын
Couldnt you just hook the constructor?
@lauriewired
@lauriewired Жыл бұрын
Sure thing! You could hook many different functions and get similar results. Just preference by situation :)
@DebbieMarieClassics
@DebbieMarieClassics Жыл бұрын
i really like your hair in this video. That's the most technical thing i can say.
@Sj-ze5wk
@Sj-ze5wk Жыл бұрын
Can u do ida native so debugging? I always get sig errors
@MrAnhell
@MrAnhell Жыл бұрын
Brains and Beauty plus easy to understand.
@2024paradigmshift
@2024paradigmshift 2 ай бұрын
At least it's not an IBM server written in Apache
@Giurigi123
@Giurigi123 8 ай бұрын
i dont understand anything this girl is just looking goood
@moviesynopsis001
@moviesynopsis001 9 ай бұрын
More like Laurie Hired!
@gabrielmottadev
@gabrielmottadev 3 ай бұрын
I really tried to pay attention, but the eyes... catchs my soul Im sorry 😔
@wrathofainz
@wrathofainz 5 ай бұрын
Nerdy girls exist: confirmed. Now how to meet them... I'll bookmark this video as part of my research to crack apks. I've been poking one unity game with the intention of removing vendor-lock. The game doesn't work unless installed from (or spoofed) the Google play store. It also has some sort of signature check apart from the usual one. Bother.
@2024paradigmshift
@2024paradigmshift 2 ай бұрын
And don't get me started on Chromebooks
@2024paradigmshift
@2024paradigmshift 2 ай бұрын
I just collect books now I hate most computers ..... especially Fujitsu and Seimens
@EugeneM
@EugeneM Жыл бұрын
Such approach works for some scenarios with very simple Android apps. In serious software this hooking gives us nothing as all of the hidden and secured app logic is implemented in native obfuscated code. Android app loads a native lib, then this lib opens some socket and communicates with Android app via that socket using encrypted strings. And when you want to change how native code works the only thing you can do is trying to trace and debug native lib via IDA. And this approach is much more complicated without any guarantee of success.
@lauriewired
@lauriewired Жыл бұрын
Are you saying that native hooking never helps for real apps? Hard disagree. It won't work for certain apps, but it's super useful in a lot of real-world situations. For example, if you are trying to get by some native anti-emulation.
@still_alive02
@still_alive02 5 ай бұрын
static disassembler like ida wont give much btw, needs to take backtrace by frida, if app have antidebugger you have to hook system calls and trace libc, for example hook functions that looks in proc/self/status
@Shinika01
@Shinika01 4 ай бұрын
of course for advanced malware the approach wouldn't be "that easy"... Don't forget that this video is merely educative to help people understand and progress.
@Vasant8300
@Vasant8300 Ай бұрын
wtf is frida and what is use of this??
@diogocardoso1479
@diogocardoso1479 4 ай бұрын
...Are you married? hahahaha. Taking the joke away, Congratulations on the video, very good indeed!!! +1Subscribed
@rvft
@rvft 8 күн бұрын
wtf is this an ai?
@AI__VOICE
@AI__VOICE Жыл бұрын
Hey you very attractive 😅 i loos my focus 😂😂😂 of the video topic 😂😂
@gxbytes
@gxbytes Жыл бұрын
me also
@throwawaythrowawayson1983
@throwawaythrowawayson1983 Жыл бұрын
@@gxbytes bro don't be thirsting over her. she's a professional. this is a tech video, not a thirst trap. take it seriously.
@throwawaythrowawayson1983
@throwawaythrowawayson1983 Жыл бұрын
you too hacker_07. don't be cringe.
@ayushmauryars
@ayushmauryars 8 ай бұрын
Will you become my friend 😢 pleasee
@kingmarwat
@kingmarwat Жыл бұрын
Amazing...... but video is tool long . It can be done in 5 minutes... In your next video, be to the point
@darren_na-18
@darren_na-18 2 ай бұрын
Great video 💪🏽Thanks!
Hooking Java Methods with Frida
29:04
LaurieWired
Рет қаралды 19 М.
Convert GUI App to Real Program -  Python to exe to setup wizard
23:27
Python Simplified
Рет қаралды 547 М.
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,7 МЛН
Симбу закрыли дома?! 🔒 #симба #симбочка #арти
00:41
Симбочка Пимпочка
Рет қаралды 5 МЛН
Smart Sigma Kid #funny #sigma
00:33
CRAZY GREAPA
Рет қаралды 10 МЛН
Android App Development Tutorial for Beginners - Your First App
55:20
freeCodeCamp.org
Рет қаралды 426 М.
Deconstructing the Android Manifest
11:21
LaurieWired
Рет қаралды 8 М.
A Competition for Unreadable Code?
12:33
LaurieWired
Рет қаралды 168 М.
what happens when your CPU has a bug? (GhostWrite)
9:58
LaurieWired
Рет қаралды 44 М.
Frida Hooking Tutorial - Android Game Hacking
16:10
Guided Hacking
Рет қаралды 35 М.
What ACTUALLY happens during a Stack Overflow?
12:43
LaurieWired
Рет қаралды 148 М.
Ghidra Analysis of Android Native Code
13:56
LaurieWired
Рет қаралды 14 М.
Reverse Engineering 101: How to Dissect and Master Any Platform
18:21
Bypassing Multiple Defenses in Android | Frida and Objection
7:39
Android Root Detection Bypass (Frida Hooking and APK Patching)
18:50
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,7 МЛН