其他分享
首页 > 其他分享> > android逆向frida hook环境搭建以及测试脚本

android逆向frida hook环境搭建以及测试脚本

作者:互联网

# encoding:utf-8
#1.window电脑(mac或者linux)上安装frida,安装步骤:
#  1)先安装python环境(可选安装npm环境,最好安装一下)
#  2)pip install frida-tools # CLI tools 地址:https://github.com/frida/frida
#     pip install frida       # Python bindings
#     npm install frida       # Node.js bindings
#2.android手机安装frida-server(手机一定要root,没有真机可以使用模拟器)
#  1)下载对应版本(arm/arm64/x86)的frida-server,地址:https://github.com/frida/frida/releases
#  2)adb push frida-server /data/local/tmp  将frida-server推送到手机/data/local/tmp目录下
#  3)adb shell 进去手机环境
#  4)su 获取root权限
#  5)cd /data/local/tmp 来到frida-server目录下
#  6)chmod 777 frida-server 给足够权限给frida-server
#  7)./frida-server 让frida服务跑起来,不要关闭此窗口
#3.转发adb端口
#  1)另外开一个cmd窗口
#  2)frida-ps -U 查看frida-server是否以及运行起来了
#  3)adb shell 进去手机环境,接着su切换到root环境,因为netstat需要
#  4)netstat -anp | grep "frida" 查看frida-server运行到端口,比如27042
#  5)再另外开一个cmd窗口
#  6)adb forward tcp:27042 tcp:27042 进行端口转发
#  7)frida-ps -Uai 可以查看手机上运行的所有进程对应的包名、pid等等
#  8)写一个测试app跑起来,app一定要跑起来先,不然hook的时候找不到进程
#  9)编写下面的脚本保存为test.py,然后执行python test.py,看到Hook Start Running即hook成功了

import frida, sys

def on_message(message, data):
    if message['type'] == 'send':
        print("[*] {0}".format(message['payload']))
    else:
        print(message)

jscode="""
Java.perform(function () {
  var s = Java.use("com.suyf.fridahook.MainActivity");
  s.stringFromJNI.implementation = function () {
    var ss = this.stringFromJNI() + "_hook";
    send(ss);
    return ss;
  };
  s.testHook.implementation = function (str) {
    this.testHook(str);
    send(str + "_add_hook");
  };

  var sfj = Module.findExportByName("libnative-lib.so", "Java_com_suyf_fridahook_MainActivity_stringFromJNI");
  Interceptor.attach(sfj, {
    onEnter: function () {
      send("sfj-onEnter-->"+arguments);
    },
    onLeave: function () {
      send("sfj-onLeave-->"+arguments);
    }
  });

});
"""
#新版本要使用name,不能使用包名,可以使用frida-ps -Uai 查看包名
process = frida.get_usb_device().attach('FridaHook')  
#pid = device.spawn(["com.android.chrome"])
#session = device.attach(pid)
#device.resume(pid)
script = process.create_script(jscode)
script.on('message', on_message)
print('[*] Hook Start Running')
script.load()
sys.stdin.read()

标签:server,hook,adb,frida,android,com,message
来源: https://www.cnblogs.com/yongfengnice/p/16366910.html