📑 Frida作业-20231114

Security Classification: 【C-1】 | Publish Time:2024-02-20 | Category:Test Notes | Edit

Expiry Notice: The article was published three months ago. Please independently assess the validity of the technical methods and code mentioned within. :)

AI摘要:本文主要介绍了使用Frida进行Android APK逆向分析的过程,涵盖了以下几个方面: 1. **system_property_get的Hook**:分析了该函数的输入输出,使用Frida在底层PLT地址进行Hook,获取设备属性的字符串。 2. **protobuf序列化数据的Hook**:通过分析protobuf的序列化过程,获取序列化数据的长度和地址,成功提取并解码了序列化内容。 3. **AES加密算法的Hook**:分析了AES加密相关的函数,特别是EVP_CipherInit_ex和EVP_CipherUpdate,获取了加密过程中使用的key和iv。 在整个过程中,强调了不Hook较短函数的原则,并建议使用全局Hook以提高稳定性。通过具体代码示例展示了如何实现这些Hook,获取关键数据用于后续分析。 --- (来自模型:gpt-4o-mini-2024-07-18)


Web3 Info

The ownership of the data in this article is secured by blockchain encryption technology and smart contracts, and is solely owned by the creator.


Comment List

© Copyright: This article is an original work and the copyright belongs to the  Depy's docs  unless marked as Reproduced

Please contact the blogger for authorization to reprint

『📕Category 』