Главная
Study mode:
on
1
Intro
2
Black-box testing challenges
3
Enter Frida
4
Where does it work?
5
Frida's toolkit
6
Simple example - frida-trace on iOS
7
Digging into a trace
8
Inside a handler
9
Modifying handlers
10
A new and improved trace
11
Where was that code running?
12
How can we use Frida?
13
Tracing functions on Android
14
Function tracing in action
15
Using a trace to explore
16
Exploring keychain functionality
17
What did we find?
18
Frida CLI
19
Exploring Keychain classes
20
Automating with agent scripts
21
Tracing Java methods on Android
22
Building agent.js
23
Java trace in action
24
How can we use agents?
25
Bluetooth metadata on Android
26
URL scheme fuzzing on iOS
27
Adding commands
28
URL scheme fuzzer highlights
29
Using Frida Codeshare
30
Bypassing controls - SSL pinning
31
SSL pinning bypass on iOS
32
Interceptor API
33
Locating nw tls create peer trust
34
Replacing nw_tls_create_peer_trust
35
Try it for yourself!
36
SSL pinning bypass - demo
37
Standalone tools
38
Elements of a standalone tool
39
Basic Python script
40
Frida rpc.exports
41
The agent: classdump.js
42
Want to learn more?
Description:
Explore innovative techniques for mobile application analysis using Frida in this 59-minute conference talk by Dawn Isabel. Discover how to overcome black-box testing challenges by building customizable lightweight analysis tools. Learn to trace library functions, examine application memory and runtime state, and bypass common security controls through practical examples on both iOS and Android platforms. Gain insights into Frida's toolkit, including frida-trace, CLI, agent scripts, and the Interceptor API. Delve into real-world scenarios such as exploring keychain functionality, Bluetooth metadata analysis, URL scheme fuzzing, and SSL pinning bypass. Master the creation of standalone tools using Frida's capabilities and enhance your mobile security testing skills.

Fun with Frida on Mobile - Leveraging Dynamic Analysis Tools

Bugcrowd
Add to list
0:00 / 0:00