Secrets of Bypassing Hook Integrity Checks on Android - Make it Yours!

Описание к видео Secrets of Bypassing Hook Integrity Checks on Android - Make it Yours!

#frida #hookdetection #integritychecks #fridadetection #android #pentest #r2pay


Hello everyone, in this video we are going to learn some advanced techniques which are used in android app for detecting frida hooks based on some frida artifacts in the memory and filesystem along with hook integrity checks. These integrity checks are based on the binary signatures and get triggered whenever we hook any instruction or function.
For learning purpose we have used the application from MSTG crackme i.e r2pay.


You can download this app directly from their github page: https://github.com/OWASP/owasp-mastg/...


It has lot of detections like root detection, frida detection, hook detection and integrity checks for protecting the app from being reversed.


App uses SVC instructions to hide the implementation of some sensitive functions such as openat() which is used to access some of the frida artifacts and also it has inlined integrity checks which causes the app to crash whenever we try to hook any instruction of function from the app.


As always feel free to comment down below in case you have any queries and i will reply as soon as i can.


Full working script is available on our github repository:
https://github.com/fatalSec/mas-crack...


Also, dont forget to hit a like button and subscribe to this channel to show your support. You can also follow us on twitter at @SecFatal.

Комментарии

Информация по комментариям в разработке