Frida
What is frida
Frida is a powerful tool that can be used for Android Apps pentest to help analyze and manipulate apps. It works by allowing testers to inject their own code into running applications, which helps them understand how an app behaves, find security issues, and potentially exploit vulnerabilities.
Here's a simple breakdown of what Frida does in Android pentesting:
Dynamic Instrumentation: Frida lets you inject custom scripts into a running Android app. This helps you monitor and control the app's behavior in real-time, without modifying the app itself.
Bypass Security: Many Android apps have security mechanisms like certificate pinning or root detection. Frida can help bypass these protections so that testers can examine how the app communicates or interacts with its backend services.
Manipulate Code: With Frida, you can change how parts of an app work by altering its functions during runtime. This helps in testing how the app handles certain data or actions, and in finding security vulnerabilities like insecure APIs.
Hooking: Frida allows testers to "hook" into specific functions of the app to see what data is being processed. For example, you can monitor encryption or decryption functions to capture sensitive data like passwords.
Flexible Scripting: It provides a scripting environment using JavaScript, so you can write custom scripts to automate tasks like logging data or manipulating responses, making it very versatile for testing different kinds of apps.
Setup
Take frida server from here
unxz frida-server-version-android-x86.xzto decompress the fileFollow the instructions form the article previously mentioned above
# Copy the server to the device
adb push ./frida-server-$version-android-$arch /data/local/tmp/frida-server
# ^Change this to match the name of the binary you just extracted
# Enable root access to the device
adb root
# Make the server binary executable
adb shell "chmod 755 /data/local/tmp/frida-server"
# Start the server on your device
adb shell "/data/local/tmp/frida-server &"I am on Ubuntu
pip3 install frida-toolsInstall Fridafrida-ps -Ufrom your ubuntuIn case you get an error like this
Failed to enumerate processes: unable to connect to remote frida-server: closedit means the server is not running on the emulator. In this case try to launch it like this
user ~/Documents/hackthebox $ adb shell
root@generic_x86_64:/ # su
root@generic_x86_64:/ # /data/local/tmp/frida-server &
[1] 3806Then
frida-ps -Ushould work and will list the running process on the target
Disable SSL Pinning
I am going to use Pinned (from the HTB challenge). If you do not have and HTB subscription you can try this on this app provided by Tim Perry from his article mentioned above.
First I launched Pinned and kept it on during the whole process
When running
frida-ps -Uyou should see the app you wish to transform in the list. Running thisfrida-ps -D emulator-5554 -aiwill give you more details on the running app-D <id>will allow you to specify which plug in device you wish to see the app installed on and-aiwill show the Identifier column. This works as wellfrida-ps -U -ai

With the other command the output looks like this

Take this script kindly provided by our new friend Tim
wget https://raw.githubusercontent.com/httptoolkit/frida-android-unpinning/main/frida-script.jsThen you just need to run
frida -D emulator-5554 -l ./frida-script.js -f com.example.pinnedorfrida -U -l ./frida-script.js -f com.example.pinnedTurn out the best way to run the app with cert pinning is with this command
frida -U -l ./frida-script.js AppnameIt will avoid bugs.
Note: Apparently the --no-pause is not necessary anymore see here

Now we should be able to intercept the traffic and actually see it in Burp (frida server should still be running for this process)
For Pinned for example I just had to click login in my screen (that I did not close)

And I got the flag from Burp

If this did not work, check out this article
Useful frida commands
frida-ls-deviceslist plugged in devicesfrida-ps -D <id> -ailist installed apps on a specific devicefrida-ps -Uailist all processes with details
Debug
Failed to spawn
If you get
Failed to spawn: need Gadget to attach on jailed Android; its default location is: /home/user/.cache/frida/gadget-android-arm64.soIt means that Gadget is missing. Gadget is important to hook on jailed devices.
Go to the official frida repo here
An get Gadget, so here for example we would need this one (but your might be different)frida-gadget-android-arm64.so
You might need to click on "Show all XXX assets" to see all the Gadget's versions

Once downloaded un zip it and then:
# Create the directory if it does not exist
mkdir /home/user/.cache/frida/
# Move the file to the directory it need to be in
mv frida-gadget-16.5.2-android-arm64.so /home/user/.cache/frida/gadget-android-arm64.soResources
Last updated