📑 Frida作业-20231114
Security Classification: 【C-1】 | Publish Time:2024-02-20 | Category:Test Notes | EditExpiry Notice: The article was published three months ago. Please independently assess the validity of the technical methods and code mentioned within. :)
AI Summary: 本文主要介绍了使用Frida进行Android APK逆向分析的过程,涵盖了以下几个方面: 1. **system_property_get的Hook**:分析了该函数的输入输出,使用Frida在底层PLT地址进行Hook,获取设备属性的字符串。 2. **protobuf序列化数据的Hook**:通过分析protobuf的序列化过程,获取序列化数据的长度和地址,成功提取并解码了序列化内容。 3. **AES加密算法的Hook**:分析了AES加密相关的函数,特别是EVP_CipherInit_ex和EVP_CipherUpdate,获取了加密过程中使用的key和iv。 在整个过程中,强调了不Hook较短函数的原则,并建议使用全局Hook以提高稳定性。通过具体代码示例展示了如何实现这些Hook,获取关键数据用于后续分析。 --- (From Model:gpt-4o-mini-2024-07-18)
Web3 Info
The ownership of the data in this article is secured by blockchain encryption technology and smart contracts, and is solely owned by the creator.
Comment List