📲
Android Reversing with Frida for Examiners
Authors:M. WilliamsonC. Atha
  • Android Reversing for Examiners
  • Setting Up
    • Prerequisites
    • Our Target: Private Photo Vault
  • Lab
    • [1] Lab setup and initial app exploration
      • [1.1] Upload frida-server to the emulator or device and run using nohup
      • [1.2] Review files in the app data directory
    • [2] Perform static analysis to locate some functions of interest
    • [3] Deploy method hooks using frida REPL
    • [4a] Moar Static Analysis
    • [4b] Cast a wide net with DBI
    • [4c] PIN bruteforce
      • [4c.1] PIN bruteforce (in depth)
  • Bonus Labs
  • Ready for more?
  • Frida-tools Reference
    • Installation & Common Flags
    • frida
    • frida-ps
    • frida-trace
  • Other Processes Reference
    • Extracting an APK specimen from the device
    • Troubleshooting frida connectivity
  • What's Next
    • Recommended Toolkits and Scripts
    • Additional Resources / Questions
  • Contact Us
Powered by GitBook
On this page

Was this helpful?

  1. Setting Up

Our Target: Private Photo Vault

PreviousPrerequisitesNext[1] Lab setup and initial app exploration

Last updated 5 years ago

Was this helpful?

Private Photo Vault is an app that is available on the iOS and Google Play stores. On Android alone, there are over 10 M recorded installations.

The app touts the following features on their website:

We will be using Private Photo Vault as our frida-ninja training ground and our objectives will be as follows:

  1. Determine which functions are called to validate attempted PINs.

  2. Investigate if/how PINs may be stored in the filesystem.

  3. Bruteforce the user PIN using the app's functions against itself.

In this lab, we will use static analysis and dynamic binary instrumentation together to help tell a story.

The very first step is setting up our lab with some data and doing some initial exploration of how the app works. This initial stage could be very similar if you are going to tackle a different app.

See to begin your lab!

[1] Lab setup and initial app exploration