Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Frida-Ios-Hook - A Tool That Helps You Easy Trace Classes, Functions, And Modify The Return Values Of Methods On iOS Platform

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Frida-Ios-Hook - A Tool That Helps You Easy Trace Classes, Functions, And Modify The Return Values Of Methods On iOS Platform


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com


A tool that helps you can easy using frida. It support script for trace classes, functions, and modify the return values of methods on iOS platform.

๏‘‰
For Android platform: frida-android-hook

๏‘‰
For Intercept Api was encrypted on iOS application: frida-ios-interceprt-api

Env OS Support

OS Supported Noted
MacOS
โœ…
main
Linux
โœ…
sub
Windows
โœ…
sub

Compatible with

iOS Frida Supported
13.2.3 14.2.13
โœ…
14.4.2 14.2.13
โœ…
14.4.2 15.0.18
โœ…

Feature

Running with python3.x

Support both spawn & attach script to process.

[+] Options:

-p(--package) Identifier of application ex: com.apple.AppStore
-n(--name) Name of application ex: AppStore
-s(--script) Using script format script.js
-c(--check-version) Check for the newest version
-u(--upadte) Update to the newest version

[*] Dump decrypt IPA:

-d, --dump Dump decrypt application.ipa
-o OUTPUT_IPA, --output=OUTPUT_IPA
Specify name of the decrypted IPA

[*] Dump memory of Application:

--dump-memory Dump memory of application

[*] HexByte Scan IPA:
--hexbyte-scan Scan or Patch IPA with byte patterns
--pattern=PATTERN Pattern for hexbytescan
--address=ADDRESS Address for hexbytescan
-t TASK, --task=TASK
Task for hexbytescan

[*] Information:

--list-devices List All Devices
--list-apps List The Installed apps
--list -appinfo List Info of Apps on Itunes
--list-scripts List All Scripts
--logcat Show system log of device
--shell Get the shell of connect device

[*] Quick method:

-m(--method) Support commonly used methods
app-static(-n)
bypass-jb(-p)
bypass-ssl(-p)
i-url-req(-n)
i-crypto(-p)

๏“œ
ChangeLog

Version: 3.6

	[+] Add:

[-] New option Show system log of device `--logcat`

[-] New option Get the shell of connect device `--shell`

[-] Add CHANGELOG.md


[+] Change:

[-] Update README.md

[-] Using `hook.json` to load configuration for the tool

[-] Optimize core `hook.py`

[+] Fix

See Full ChangeLog

Install

	[+] Latest version

https://github.com/noobpk/frida-ios-hook/releases

[+] Develop version

git clone -b dev https://github.com/noobpk/frida-ios-hook

Build

1. cd frida-ios-hook/
2. pip3 install -r requirements.txt
3. python3 setup.py
4. cd frida-ios-hook

Usage

See Full Usage as Wiki

If you run the script but it doesn't work, you can try the following: frida -U -f package -l script.js

๏“บ
Demo Feature

Title Link
Frida iOS Hook | Basic Usage | Install - List devices - List apps - List scripts - Logcat - Shell https://youtu.be/xSndHgTdv4w
Frida iOS Hook | Basic Usage | Dump Decrypt IPA - Dump Memory App - Hexbyte-Scan IPA https://youtu.be/AUsJ9_gnWAI
Frida iOS Hook | Basic Usage | App Static - Bypass Jailbreak - Bypass SSL - Intercept URL + Crypto https://youtu.be/nWhKDSzArf8

Frida-Script

Updated some frida scripts to help you with the pentest ios app. Filter script using spawn(S) or attach(A)

N Spawn/Attach Script Name Script Description Script Version
1 S backtrace.js Backtrace 1.0
2 S bypass-flutter-ssl.js Flutter bypass ssl pinning 1.0
3 S bypass-jailbreak-1.js Basic bypass jailbreak detection 1.0
4 S bypass-ssl-ios13.js iOS 13 bypass ssl pinning 1.0
5 S dump-ios-url-scheme.js Dump iOS url scheme when "openURL" is called 1.0
6 S dump-ui.js Dump the current on-screen User Interface structure 1.0
7 S+A find-all-classes-methods.js Dump all methods inside all classes 1.0
8 S+A find-all-classes.js Dump all classes used by the app 1.0
9 S+A find-app-classes-methods.js Dump all methods inside classes owned by the app only 1.0
10 S+A find-app-classes.js Dump classes owned by the app only 1.0
11 S+A find-specific-method.js Find a specific method in all classes 1.0
12 S+A flutter_trace_function.js iOS flutter trace function 1.0
13 S+A hook-all-methods-of-all-classes-app-only.js Hook all the methods of all the classes owned by the app 1.0
14 S+A hook-all-methods-of-specific-class.js Hook all the methods of a particular class 1.0
15 S+A hook-specific-method-of-class.js Hook a particular method of a specific class 1.0
16 S+A intercept-nslog.js Intercept calls to Apple's NSLog logging function 1.0
17 S+A ios-app-static-analysis.js iOS app static analysis 1.0
18 S ios-biometric-bypass.js iOS Biometric Bypass 1.0
19 S+A ios-intercept-crypto-2.js iOS Intercepts Crypto Operations 2 1.0
20 S+A ios-intercept-crypto.js iOS Intercepts Crypto Operations 1.0
21 S+A ios-list-apps.js iOS List Application 1.0
22 S+A ios-url-scheme-fuzzing.js iOS URL Scheme Fuzzing 1.0
23 S+A pasteboard-monitoring.js Monitor usage of pasteboard. Useful to show lack of secure attribute on sensitive fields allowing data copying. 1.0
24 S+A raptor_frida_ios_autoIntercept.js Raptor frida ios auto intercept 1.0
25 S+A raptor_frida_ios_bypass1.js Raptor frida ios bypass 1 1.0
26 S+A raptor_frida_ios_bypass2.js Raptor frida ios bypass 2 1.0
27 S+A raptor_frida_ios_call.js Raptor frida ios call 1.0
28 S+A raptor_frida_ios_debug.js Raptor frida ios debug 1.0
29 S+A raptor_frida_ios_enum.js Raptor frida ios enum 1.0
30 S+A raptor_frida_ios_lowlevel1.js Raptor frida ios low level 1 1.0
31 S+A raptor_frida_ios_lowlevel2.js Raptor frida ios low level 2 1.0
32 S+A raptor_frida_ios_stalker.js Raptor frida ios stalker 1.0
33 S+A raptor_frida_ios_touchid.js Raptor frida ios touchid 1.0
34 S+A raptor_frida_ios_trace.js Raptor frida ios trace 1.0
35 S+A read-nsuserdefaults.js Show contents of NSUserDefaults 1.0
36 S+A read-plist-file.js Show contents of a Plist file 1.0
37 S replace-exported-method.js Replace a module's exported function 1.0
38 S+A show-all-methods-of-specific-class.js Dump all methods of a particular class 1.0
39 S+A show-argument-type-count-and-return-value-type.js Show argument type & count and type of return value for a function in a class 1.0
40 S+A show-instance-variables-for-specific-class.js Show all instance variables of a particular class 1.0
41 S+A show-modify-function-arguments.js Show and modify arguments of a function inside a class 1.0
42 S+A show-modify-method-return-value.js Show and modify return value of a particular method inside a class 1.0
43 S+A show_binarycookies.js Show contents of Cookies.binarycookies file 1.0

Hexbytescan-Task

N Task Name Task Description
1 openssl_hook.json OpenSSL 1.0.2 certificate pinning hook on arm64
2 openssl_1_1_0_hook.json OpenSSL 1.1.0 certifiate pinning hook for arm64, it modifies cmp instruction in tls_process_server_certificate method
3 openssl_hook_v2.json OpenSSL 1.0.2 certificate pinning hook on arm64, improved pattern, possibly for different compiler version or slighlty updated OpenSSL, use if first version does not find patch location. These hooks patch call to ssl_verify_cert_chain in ssl3_get_server_certificate.

Disclaimer

Because I am not a developer, so my coding skills might not be the best. Therefore, if this tool have any issue or not working for you, create an issue and i will try to fix it. Any suggestions for new feature and discussions are welcome!



...



๐Ÿ“Œ Frida-Extract - Frida.re Based RunPE (And MapViewOfSection) Extraction Tool


๐Ÿ“ˆ 47.59 Punkte

๐Ÿ“Œ Frida-Wshook - Script Analysis Tool Based On Frida.re


๐Ÿ“ˆ 45.8 Punkte

๐Ÿ“Œ Runtime Mobile Security (RMS) - A Powerful Web Interface That Helps You To Manipulate Android Java Classes And Methods At Runtime


๐Ÿ“ˆ 44.13 Punkte

๐Ÿ“Œ Serverless Prey - Serverless Functions For Establishing Reverse Shells To Lambda, Azure Functions, And Google Cloud Functions


๐Ÿ“ˆ 36.49 Punkte

๐Ÿ“Œ Functions of Commercial Bank: Primary Functions and Secondary Functions


๐Ÿ“ˆ 36.49 Punkte

๐Ÿ“Œ GetSet-Values, a tool to import/export values from config files into a script


๐Ÿ“ˆ 35.79 Punkte

๐Ÿ“Œ 5 Easy Ways to Return Multiple Values in C#


๐Ÿ“ˆ 34.74 Punkte

๐Ÿ“Œ How do I modify state values in React with MobX-State-Tree?


๐Ÿ“ˆ 32.84 Punkte

๐Ÿ“Œ CPUID Spoofer, a x64dbg plugin that helps you to modify the behaviour of the CPUID instruction


๐Ÿ“ˆ 32.64 Punkte

๐Ÿ“Œ How to get Frida to automatically log all hooked functions? In this vid the presenter mentions it


๐Ÿ“ˆ 31.78 Punkte

๐Ÿ“Œ Mastering Global Functions in Laravel: Easy Methods for Versions 8,9,10,11.


๐Ÿ“ˆ 31.52 Punkte

๐Ÿ“Œ IBM Spectrum Protect 7.1/8.1 Client Trace Trace File Credentials information disclosure


๐Ÿ“ˆ 30.96 Punkte

๐Ÿ“Œ Wireshark bis 2.0.5 IPMI Trace Dissector packet-ipmi-trace.c Denial of Service


๐Ÿ“ˆ 30.96 Punkte

๐Ÿ“Œ Linux Kernel up to 4.14.10 kernel/trace/trace.c allocate_trace_buffer Double-Free memory corruption


๐Ÿ“ˆ 30.96 Punkte

๐Ÿ“Œ SAP Solution Manager 7.20 Trace Analysis Trace File Log privileges management


๐Ÿ“ˆ 30.96 Punkte

๐Ÿ“Œ CVE-2016-7180 | Wireshark up to 2.0.5 IPMI Trace Dissector packet-ipmi-trace.c use after free (Nessus ID 93620 / ID 370157)


๐Ÿ“ˆ 30.96 Punkte

๐Ÿ“Œ Wireshark bis 2.0.5 IPMI Trace Dissector packet-ipmi-trace.c Denial of Service


๐Ÿ“ˆ 30.96 Punkte

๐Ÿ“Œ Pandas โ€“ Convert Categorical Values to Int Values


๐Ÿ“ˆ 30.41 Punkte

๐Ÿ“Œ JavaScript Primitive Values vs Reference Values โ€“ Explained with Examples


๐Ÿ“ˆ 30.41 Punkte

๐Ÿ“Œ In a Multilevel Relationship, How to Replace Null Values at Nodes by Corresponding Values at Their Parent Nodes


๐Ÿ“ˆ 30.41 Punkte

๐Ÿ“Œ Introducing PyDicom, its Classes, Methods, and Attributes.


๐Ÿ“ˆ 29.12 Punkte

๐Ÿ“Œ What is Hoisting in JavaScript | Hoisting Functions, Variables and Classes


๐Ÿ“ˆ 29.02 Punkte

๐Ÿ“Œ [Guider] how to trace all functions on user-level and kernel level for syscalls?


๐Ÿ“ˆ 28.83 Punkte

๐Ÿ“Œ items(), keys() and values() methods in Python dictionary


๐Ÿ“ˆ 28.66 Punkte

๐Ÿ“Œ Using Classes Instead of Associative Arrays for Better Type Safety in PHP Functions


๐Ÿ“ˆ 27.24 Punkte

๐Ÿ“Œ Classes vs Factory functions in Javascript


๐Ÿ“ˆ 27.24 Punkte

๐Ÿ“Œ Organizing Python Functions in Utility Classes


๐Ÿ“ˆ 27.24 Punkte

๐Ÿ“Œ Why Functions Are Better Than Classes in React.js


๐Ÿ“ˆ 27.24 Punkte

๐Ÿ“Œ You Need to Know About Pure Functions & Impure Functions in JavaScript


๐Ÿ“ˆ 27.09 Punkte

๐Ÿ“Œ PC shortages will affect millions of students as they return to classes


๐Ÿ“ˆ 26.91 Punkte

๐Ÿ“Œ Extending the Exploration and Analysis of Windows RPC Methods Calling other Functions with Ghidra ?, Jupyter Notebooks ? and Graphframes ?!


๐Ÿ“ˆ 26.8 Punkte

๐Ÿ“Œ Returning Values from Bash Functions


๐Ÿ“ˆ 26.78 Punkte

๐Ÿ“Œ Logitech's new Zone Learn headset helps kids with online classes


๐Ÿ“ˆ 26.73 Punkte











matomo