frida示例代码仓库
check_for_native_calls.py | ||
dump_dynamically_created_files.py | ||
install_frida_server.sh | ||
log_string_builders_and_string_compare.js | ||
README.md |
learn-frida-the-hard-way
TODOs:
-
Add GIFs & docs
-
Enumerate loaded classes
$ frida -U com.pkg -qe 'Java.perform(function(){Java.enumerateLoadedClasses({"onMatch":function(c){console.log(c);}});});' -o pkg.classes
-
Extract modules from APK
$ frida -Uq com.android. -e "Process.enumerateModules({onMatch: function(m){console.log('-' + m.name)},onComplete:function(){}})" .... -libsqlite.so
-
get methods from .so file
$ adb pull /system/lib/libsqlite.so /system/lib/libsqlite.so: 1 file pulled. 19.7 MB/s (975019 bytes in 0.047s) $ nm -D libsqlite.so | cut -d' ' -f3 | grep sqlite3 sqlite3_aggregate_context sqlite3_aggregate_count .... $ frida-trace -U -i "sqlite*" com.android. ... 24878 ms sqlite3_changes() 24878 ms sqlite3_reset() 24878 ms | sqlite3_free() 24878 ms | sqlite3_free() 24878 ms sqlite3_clear_bindings() 24878 ms sqlite3_prepare16_v2() <<< this is the one that holds the SQL queries 24878 ms | sqlite3_free()
-
SQLite hook example (+Native)
Interceptor.attach(Module.findExportByName('libsqlite.so', 'sqlite3_prepare16_v2'), { onEnter: function(args) { console.log('DB: ' + Memory.readUtf16String(args[0]) + '\tSQL: ' + Memory.readUtf16String(args[1])); } });
-
Hook example:
java.lang.reflect.Method#invoke(Object obj, Object... args, boolean bool)
Java.use('java.lang.reflect.Method').invoke.overload('java.lang.Object', '[Ljava.lang.Object;', 'boolean').implementation = function(a,b,c) { console.log('hooked!', a, b, c); return this.invoke(a,b,c); };
-
Hook constructor
Java.use('java.lang.StringBuilder').$init.overload('java.lang.String').implementation = function(stringArgument) { console.log("c'tor"); return this(stringArgument); };
-
Hook Native (JNI)
Interceptor.attach(Module.findExportByName(null, "dlopen"), {
onEnter: function(args) {
var lib = Memory.readUtf8String(args[0]);
console.log("dlopen called with: " + lib);
this.lib = lib; // pass argument to onLeave
},
onLeave: function(retval) {
console.log("dlopen called exit with: " + this.lib);
if (this.lib.endsWith("libfoo.so")) {
console.log("ret: " + retval);
var funcAddr = 0x0021e5b4; // find function address with $ nm --demangle --dynamic libfoo.so | grep "SomeClass::someFunction"
var offset = Module.findBaseAddress("libfoo.so"); // Process.findModuleByName("libfoo.so").base) will also work
Interceptor.attach(offset.add(funcAddr), {
onEnter: function(args) {
console.log('hooked !');
}
});
}
}
});
References overview: