Android Hook Crypto Functions
0 | 4K
Uploaded by: @sdcampbell
This is used for testing "MASTG-TEST-0013/14/15/16: Testing Cryptography"
This is used for testing "MASTG-TEST-0013/14/15/16: Testing Cryptography"
This is used for testing "MASTG-TEST-0005: Determining Whether Sensitive Data Is Shared with Third Parties via Notifications"
This script hooks into a function called IsDrived() which contains several private function.
This script traces functions typically related to vm and root detection to find what you need to hook to bypass root detection.
Ver dados do dispositivo em tempo de execucao
How it works: - It registers a new WebAppInterface class, which contains the functions to be exported (example showToast) - It then hooks the Activity to obtain a valid context - It then hooks the WebView.loadUrl method, to add a context specific WebAppInterface instance - Lastly, it overrides the annotation checks and instructs that all requested methods are allowed to be requested.
a
Dumper
sslpinning
5
Teste
capturing-and-decrypting-https-traffic-from-ios-apps-using-frida
Swift StringI nterceptor
How It Works: Tracing: This script traces methods commonly involved in handling sensitive data, like retrieving data from SharedPreferences, sending SMS messages, making HTTP requests, and performing cryptographic operations. Stack Tracing: It also prints out stack traces for each call to help identify where in the app the data handling occurs. Logging: The script logs method calls and arguments, which can help identify if any sensitive data is being handled improperly. Usage: Save this script to a file, e.g., trace_sensitive_data.js. Run it with Frida on your target app: frida -U -f com.example.app -l trace_sensitive_data.js --no-pause
test root detection
search string in the memory