Loading...

Bypassing advance root detections using Frida

8435 269________

#mobilesecurity #rootdetection #android #mobilepentesting #reverseengineering #radare2 #arm64

Hello everyone, hope you all are doing good.

In this video, we are going to learn various different techniques used by app developers to protect their app from running on a rooted device and also how we can bypass them using frida.

Techniques learned in this tutorial:
Presence of SU binary paths
SELinux Policies
mountinfo
attr/prev
Looking for SU binary paths using Supervisor calls

You can download the sample app from our github repo:
github.com/fatalSec/android_in_app_protections/blo…

If you are interested in learning how to decrypt encrypted strings using emulation then don't forget to watch the previous video:
   • Emulating Android library to decrypt strin...  

If you enjoy our content then dont forget to like share and subscribe to the channel.
Also, now you can join our community of FatalSec on telegram: t.me/+74Fx_Za9XS41OGU1

If you find pleasure in watching our videos and would like to support us, you have the option to contribute by buying a coffee for us: www.buymeacoffee.com/secfatalz

コメント