Skip to main content

Posts

Featured

Dynamic Hooking and Overwriting of Native Android Password Validation Using Frida

Dynamic Hooking: Bypassing Android Password Validation and Manipulating UI with Frida Dynamic Hooking: Bypassing Android Password Validation and Manipulating UI with Frida Introduction In this exploration, we leverage Frida , a powerful dynamic instrumentation toolkit, to manipulate native Android password validation logic and manipulate UI elements programatically. These techniques showcase how we can reveal vulnerabilities and assess applications. Password Validation Hooking We begin by dynamically intercepting the password validation function in the native library. The library libnative-lib.so serves as the artifact providing the functionality, and the script attaches to the function Java_com_optiv_ndkcrackme_MainActivity_b , which is responsible for handling password validation: Java.perform(function () { var lib = Module.findExportByName("libnative-lib.so", "Java_com_optiv_ndkcrackme_MainActivity_b");...

Latest Posts

Advanced Detection and Mitigation of Rogue Base Stations Using RayHunter & a Rooted 4G Hotspot

Automated Exploitation of a Bluetooth vulnerability that leads to 0-click code execution

Sniffing GSM traffic on a private cellphone network

What's a Pumpkin Honeypot and why you should probably be using a VPN when you're on free Wi-Fi

Raspberry Pi WiFi Honeypot 🍯

Hack The Box - Swagshop - CTF writeup