
Bypassing advance root detections using Frida
#mobilesecurity #rootdetection #android #mobilepentesting #reverseengineering #radare2 #arm64
Hello everyone, hope you all are doing good.
In this video, we are going to learn various different techniques used by app developers to protect their app from running on a rooted device and also how we can bypass them using frida.
Techniques learned in this tutorial:
Presence of SU binary paths
SELinux Policies
mountinfo
attr/prev
Looking for SU binary paths using Supervisor calls
You can download the sample app from our github repo:
github.com/fatalSec/android_in_app_protections/blo…
If you are interested in learning how to decrypt encrypted strings using emulation then don't forget to watch the previous video:
• Emulating Android library to decrypt strin...
If you enjoy our content then dont forget to like share and subscribe to the channel.
Also, now you can join our community of FatalSec on telegram: t.me/+74Fx_Za9XS41OGU1
If you find pleasure in watching our videos and would like to support us, you have the option to contribute by buying a coffee for us: www.buymeacoffee.com/secfatalz
コメント