### learn-frida-the-hard-way - Enumerate loaded classes $ frida -U com.pkg -qe 'Java.perform(function(){Java.enumerateLoadedClasses({"onMatch":function(c){console.log(c);}});});' -o pkg.classes - Extract modules from APK $ frida -Uq com.android. -e "Process.enumerateModules({onMatch: function(m){console.log('-' + m.name)},onComplete:function(){}})" .... -libsqlite.so - get methods from .so file $ adb pull /system/lib/libsqlite.so /system/lib/libsqlite.so: 1 file pulled. 19.7 MB/s (975019 bytes in 0.047s) $ nm -D libsqlite.so | cut -d' ' -f3 | grep sqlite3 sqlite3_aggregate_context sqlite3_aggregate_count .... $ frida-trace -U -i "sqlite*" com.android. ... 24878 ms sqlite3_changes() 24878 ms sqlite3_reset() 24878 ms | sqlite3_free() 24878 ms | sqlite3_free() 24878 ms sqlite3_clear_bindings() 24878 ms sqlite3_prepare16_v2() <<< this is the one that holds the SQL queries 24878 ms | sqlite3_free() - SQLite hook example (+Native) Interceptor.attach(Module.findExportByName('libsqlite.so', 'sqlite3_prepare16_v2'), { onEnter: function(args) { console.log('DB: ' + Memory.readUtf16String(args[0]) + '\tSQL: ' + Memory.readUtf16String(args[1])); } }); * Hook example: `java.lang.reflect.Method#invoke(Object obj, Object... args, boolean bool)` Java.use('java.lang.reflect.Method').invoke.overload('java.lang.Object', '[Ljava.lang.Object;', 'boolean').implementation = function(a,b,c) { console.log('hooked!', a, b, c); return this.invoke(a,b,c); }; * Hook constructor Java.use('java.lang.StringBuilder').$init.overload('java.lang.String').implementation = function(stringArgument) { console.log("c'tor"); return this(stringArgument); }; * Hook Native (JNI) ``` Interceptor.attach(Module.findExportByName(null, "dlopen"), { onEnter: function(args) { var lib = Memory.readUtf8String(args[0]); console.log("dlopen called with: " + lib); this.lib = lib; // pass argument to onLeave }, onLeave: function(retval) { console.log("dlopen called exit with: " + this.lib); if (this.lib.endsWith("libfoo.so")) { console.log("ret: " + retval); var funcAddr = 0x0021e5b4; // find function address with $ nm --demangle --dynamic libfoo.so | grep "SomeClass::someFunction" var offset = Module.findBaseAddress("libfoo.so"); // Process.findModuleByName("libfoo.so").base) will also work Interceptor.attach(offset.add(funcAddr), { onEnter: function(args) { console.log('hooked !'); Thread.backtrace(this.context, Backtracer.ACCURATE).forEach(function(addr) { console.log('\t' + addr + ' : ' + DebugSymbol.fromAddress(addr)); }); } }); } } }); ``` TODOs: - Add GIFs & docs References overview: * https://techblog.mediaservice.net/2017/09/tracing-arbitrary-methods-and-function-calls-on-android-and-ios/ * https://zhiwei.li/text/2016/02/01/%E7%BC%96%E8%AF%91frida/