4

学破解第181天,《hook框架-objection使用》学习

 2 years ago
source link: https://www.52pojie.cn/thread-1582963-1-1.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

0x1 介绍

Objection是一款基于frida的hook框架,由于frida需要我们自己编写脚本,使用比较麻烦,objection内置了在安卓和IOS逆向中常用的一些hook脚本,我们通过简单的命令行就可以进行hook,非常方便。

0x2 objection环境配置

  1.依赖frida

需要先安装好frida

pip3 install objection

0x3 常用命令

Objection -g 包名/PID explore  注入app进程

报错首先看看frida是不是没开启

 复制代码 隐藏代码
mount -o rw,remount / adb push frida-server /sbin chmod +x /sbin/frida-server frida-server

  2.命令行

1)android root disable  绕过root检测

2)android proxy set <ip address> <port>  设置代{过}{滤}理(不需要在本地和手机安装一些证书)

3)android sslpinning disable  禁用证书固定(达到绕过证书检测的目的)

4)android hooking watch class_ method 类名- dump-return  查看函数返回值

5)android hooking set return_ value函数false  修改函数返回值

0x4 实战

  1.输入Objection看看:

 复制代码 隐藏代码
Traceback (most recent call last):   File "c:\users\lenovo\appdata\local\programs\python\python38\lib\site-packages\pkg_resources\__init__.py", line 582, in _build_master     ws.require(__requires__)

  2.报错,最终实战失败,未找到解决方法。


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK