In this video, we use Frida to hook and augment the functionality of a Java method in an Android Application.
---
Timestamps:
00:00 Intro
01:10 Opening Sample
01:51 Choosing a Method
03:43 Installing Application
05:30 Frida Connection
09:45 Showing User Installed Applications
10:22 Attaching to a Process
11:53 Writing Frida Script
15:15 Finding the Fully Qualified Class Name
16:21 Changing the Implementation
22:13 JavaScript Note
22:40 Running the Modified Application
24:49 Uh Oh! Method not triggered
26:56 Modified Script Success!
28:11 Recap
---
Software Links Mentioned in Video:
Frida: https://github.com/frida/frida
Docker Android: https://github.com/budtmo/docker-android
---
Malware Examined in the video (Cerberus):
sha256:c81234b6ceb3572c6d862a9313e019b98efd83165d8c085bd3e74971c66763bb
MalwareBazaar Link:
https://bazaar.abuse.ch/sample/c81234b6ceb3572c6d862a9313e019b98efd83165d8c085bd3e74971c66763bb/
---
laurieWIRED Twitter:
https://twitter.com/lauriewired
laurieWIRED Website:
http://lauriewired.com
laurieWIRED Github:
https://github.com/LaurieWired
laurieWIRED HN:
https://news.ycombinator.com/user?id=lauriewired
laurieWIRED Reddit:
https://www.reddit.com/user/LaurieWired