本文为看雪论坛文章
看雪论坛作者ID:无造
本文为看雪安卓高研2w班(8月班)优秀学员作品。
查看代码
public boolean check(String content) {
if (Shell(content)) {
return true;
}
return false;
}
public native boolean Shell(Object obj);
bool __fastcall sub_87C4(const char *a1)
{
s = (char *)a1;
v2 = (unsigned __int8 *)off_1B004;
if ( strlen(s) < 6 )
v4 = (unsigned __int8)*s == *v2
&& (unsigned __int8)s[1] == v2[1]
&& (unsigned __int8)s[2] == v2[2]
&& (unsigned __int8)s[3] == v2[3]
&& (unsigned __int8)s[4] == v2[4];
...
.data:0001B004 off_1B004 DCD byte_1B008 ; DATA XREF: sub_876C+16o
.data:0001B004 ; sub_876C+18r ...
.data:0001B008 ; _BYTE byte_1B008[8]
.data:0001B008 byte_1B008 DCB 0x9F, 0x94, 0x99, 0x9F, 0x97, 0xFC, 0, 0
//hook .datadiv_decode9080531325931451386
void *(*old_datadiv_decode)() = nullptr;
void *new_datadiv_decode() {
__android_log_print(4, "hookso", "new_datadiv_decode onEnter");
void *result = old_datadiv_decode();
__android_log_print(4, "hookso", "new_datadiv_decode onLeave");
return result;
}
void starthookInitArray() {
void *libchandle = dlopen("libnative-lib.so", RTLD_NOW);
__android_log_print(4, "hookso", "libchandle->0x%x",libchandle);
void *datadiv_decode_addr = dlsym(libchandle, ".datadiv_decode9080531325931451386");
__android_log_print(4, "hookso", "datadiv_decode_addr->0x%x",datadiv_decode_addr);
if (registerInlineHook((uint32_t) datadiv_decode_addr, (uint32_t) new_datadiv_decode,
(uint32_t **) &old_datadiv_decode) !=
ELE7EN_OK) {
return;
}
if (inlineHook((uint32_t) datadiv_decode_addr) == ELE7EN_OK) {
__android_log_print(4, "hookso", "hook native-lib.so->datadiv_decode9080531325931451386 success!");
//return -1;
}
}
frida hook 验证
Interceptor.attach(addr_call_function_args, {
onEnter : function(args){
var typename = args[0].readCString();
var soname = args[2].readCString();
if(typename == "function" && soname.indexOf("libnative-lib.so") > -1){
//这里是init_array
var funcaddr = args[1];
console.log("addr_call_function_args onEnter->",funcaddr);
Interceptor.attach(funcaddr, {
onEnter : function(args){
console.log("call ", funcaddr," onEnter->");
},
onLeave: function(retval){
console.log("call ", funcaddr," onLeave->");
}
});
}
},
onLeave: function(retval){
// console.log("addr_call_function_args onLeave->");
}
});
android_dlopen_ext: /data/app/com.kanxue.hookinit_array-ePb0iNQ5c_WaWNJ8D3IHsw==/lib/arm/libnative-lib.so
addr_call_function_args onEnter-> 0xcbf0b1b9
call 0xcbf0b1b9 onEnter-> //.datadiv_decode9080531325931451386
call 0xcbf0b1b9 onLeave->
addr_call_function_args onEnter-> 0xcbf0a76d
call 0xcbf0a76d onEnter-> //sub_876C
call 0xcbf0a76d onLeave->
libnative-> [object Object]
libnative-> 0xcbf02000
datadiv_decode_addr-> 0xcbf0b1b9
Interceptor.attach(addr_call_function_args, {
onEnter : function(args){
var typename = args[0].readCString();
var soname = args[2].readCString();
if(typename == "function" && soname.indexOf("libnative-lib.so") > -1){
//这里是init_array
var funcaddr = args[1];
console.log("addr_call_function_args onEnter->",funcaddr);
console.log("before function->", g_start_byte.readByteArray(g_byte_len));
this.printafter = true;
}
},
onLeave: function(retval){
console.log("after function->", g_start_byte.readByteArray(g_byte_len));
var bs = g_start_byte.readByteArray(g_byte_len);
var start = -1;
var preu8 = 0;
for(var i=0; i<g_byte_len; i++){
var valu8 = g_start_byte.add(i).readU8();
if(valu8 == 0){
if(preu8 != 0){
console.log("so addr[0x"+(g_start_byte.add(start+1) - g_libnative.base).toString(16)+"]->",g_start_byte.add(start+1).readCString());
}
start = i;
}
preu8 = valu8;
}
}
});
Interceptor.attach(func_call_constructors, {
onEnter : function(args){
var soname = args[0].readCString();
if( soname.indexOf("libnative-lib.so") > -1){
//这时候就能通过findModuleByName查找到我们需要的so
var libnative = Process.findModuleByName("libnative-lib.so");
g_libnative = libnative;
g_start_byte = g_libnative.base.add(0x1B008);
g_byte_len = 0x1B0C0 - 0x1B008;
console.log("func_call_constructors onEnter->",soname,g_libnative.base );
}
},
onLeave: function(retval){
// console.log("func_call_constructors onLeave->");
}
});
before function-> 0 1 2 3 4 5 6 7 8 9 A B C D E F 0123456789ABCDEF
00000000 9f 94 99 9f 97 fc 00 00 14 17 16 11 10 13 12 1d ................
00000010 1c 1f 1e 19 18 1b 1a 05 04 07 06 01 00 03 02 0d ................
00000020 0c 0f 34 37 36 31 30 33 32 3d 3c 3f 3e 39 38 3b ..4761032=<?>98;
00000030 3a 25 24 27 26 21 20 23 22 2d 2c 2f 65 64 67 66 :%$'&! #"-,/edgf
00000040 61 60 63 62 6d 6c 7e 7a 55 8c da a9 6b 46 4f 4f a`cbml~zU...kFOO
00000050 4c 03 45 51 4c 4e 03 60 08 08 23 f2 f1 e3 f9 f3 L.EQLN.`..#.....
00000060 cf e3 e4 e2 f9 fe f7 90 75 78 78 7b 77 75 60 7b ........uxx{wu`{
00000070 66 28 40 2a 2e 2e 75 78 78 7b 77 75 60 71 3c 67 f(@*..uxx{wu`q<g
00000080 7d 6e 71 4b 60 34 7a 3d 34 33 7a 33 34 71 6c 77 }nqK`4z=43z34qlw
00000090 71 71 70 67 34 79 75 6c 7d 79 61 79 34 67 61 64 qqpg4yul}yay4gad
000000a0 64 7b 66 60 71 70 34 67 7d 6e 71 14 21 99 e9 cb d{f`qp4g}nq.!...
000000b0 fd 99 e9 cb 20 51 ea cb .... Q..
after function-> 0 1 2 3 4 5 6 7 8 9 A B C D E F 0123456789ABCDEF
00000000 63 68 65 63 6b 00 00 00 41 42 43 44 45 46 47 48 check...ABCDEFGH
00000010 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 IJKLMNOPQRSTUVWX
00000020 59 5a 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e YZabcdefghijklmn
00000030 6f 70 71 72 73 74 75 76 77 78 79 7a 30 31 32 33 opqrstuvwxyz0123
00000040 34 35 36 37 38 39 2b 2f 00 25 73 00 48 65 6c 6c 456789+/.%s.Hell
00000050 6f 20 66 72 6f 6d 20 43 2b 2b 00 62 61 73 69 63 o from C++.basic
00000060 5f 73 74 72 69 6e 67 00 61 6c 6c 6f 63 61 74 6f _string.allocato
00000070 72 3c 54 3e 3a 3a 61 6c 6c 6f 63 61 74 65 28 73 r<T>::allocate(s
00000080 69 7a 65 5f 74 20 6e 29 20 27 6e 27 20 65 78 63 ize_t n) 'n' exc
00000090 65 65 64 73 20 6d 61 78 69 6d 75 6d 20 73 75 70 eeds maximum sup
000000a0 70 6f 72 74 65 64 20 73 69 7a 65 00 21 d9 ea cb ported size.!...
000000b0 fd d9 ea cb 20 91 eb cb .... ...
so addr[0x1b008]-> check
so addr[0x1b010]-> ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
so addr[0x1b051]-> %s
so addr[0x1b054]-> Hello from C++
so addr[0x1b063]-> basic_string
so addr[0x1b070]-> allocator<T>::allocate(size_t n) 'n' exceeds maximum supported size
Xposed 实现
void *addr_call_constructors = (void *)((unsigned int)liblinker+0x2654+1);
void *liblinker = (void *)(0xb6f16000);
__android_log_print(4, "hookso", "liblinker->0x%x",liblinker);
void *addr_call_constructors = (void *)((unsigned int)liblinker+0x2654+1);
__android_log_print(4, "hookso", "addr_call_constructors->0x%x",addr_call_constructors);
08-16 20:06:08.558 7176-7176/com.kanxue.hookinit_array I/hookso: addr_call_constructors->0xb6f18655
08-16 20:06:08.574 7176-7176/com.kanxue.hookinit_array I/hookso: hook linker->call_constructors success!
08-16 20:06:08.643 7176-7176/com.kanxue.hookinit_array I/hookso: new_call_constructors onEnter
08-16 20:06:08.643 7176-7176/com.kanxue.hookinit_array I/hookso: new_call_constructors onEnter
08-16 20:44:39.379 16857-16857/com.kanxue.hookinit_array I/hookso: hook linker->call_fucntion success!
08-16 20:44:39.709 16857-16857/com.kanxue.hookinit_array I/hookso: new_call_fucntion onEnter DT_INIT libnative-lib.so
08-16 20:44:39.709 16857-16857/com.kanxue.hookinit_array I/hookso: new_call_fucntion onEnter function libnative-lib.so addr:0xb3e551b9
08-16 20:44:39.709 16857-16857/com.kanxue.hookinit_array I/hookso: new_call_fucntion onEnter function libnative-lib.so addr:0xb3e5476d
if( loadPackageParam.packageName.equals("com.kanxue.hookinit_array")){
XposedBridge.log("XLZH" + loadPackageParam.packageName);
System.load("/data/data/com.kanxue.hookinit_array/lib/hookso.so");
}
void *new_call_fucntion(void* name,void* a2,void* a3) {
char* soname = (char *)name;
char* type = (char *)a2;
bool printafter = false;
if(strstr(soname,"libnative-lib.so")) {
if(strstr(type,"DT_INIT")) {
addr_libnative = get_module_base(-1, "libnative-lib.so");
__android_log_print(4, "hookso", "new_call_fucntion onEnter DT_INIT %s soaddr:0x%x",
soname, addr_libnative);
} else if(strstr(type,"function")) {
printafter = true;
__android_log_print(4, "hookso", "new_call_fucntion onEnter function %s addr:0x%x",
soname, a3);
unsigned char storebox[200]={0};
if(memcpy(storebox, (void *)((unsigned int)addr_libnative+0x1B008), 200)!=NULL)
{
char printstr[1024] = {0};
for(int z=0;z<200;z++)
{
sprintf(printstr+z*2, "%02x", storebox[z]);
}
__android_log_print(4, "hookso", "0x%x->%s",((unsigned int)addr_libnative+0x1B008),printstr);
}
}
}
void *result = old_call_fucntion(name, a2 ,a3);
if(printafter){
__android_log_print(4, "hookso", "new_call_fucntion onLeave function %s addr:0x%x",
soname, a3);
unsigned char storebox[200]={0};
if(memcpy(storebox, (void *)((unsigned int)addr_libnative+0x1B008), 200)!=NULL)
{
char printstr[1024] = {0};
for(int z=0;z<200;z++)
{
sprintf(printstr+z*2, "%02x", storebox[z]);
}
__android_log_print(4, "hookso", "0x%x->%s",((unsigned int)addr_libnative+0x1B008),printstr);
}
}
return result;
}
void starthookInitArray() {
void* liblinker = get_module_base(-1, "/system/bin/linker");
__android_log_print(4, "hookso", "liblinker->0x%x",liblinker);
//0x2434是6.0 call_function偏移
void *addr_call_function = (void *)((unsigned int)liblinker+0x2434+1);
__android_log_print(4, "hookso", "addr_call_function->0x%x",addr_call_function);
if (registerInlineHook((uint32_t) addr_call_function, (uint32_t) new_call_fucntion,
(uint32_t **) &old_call_fucntion) !=
ELE7EN_OK) {
return;
}
if (inlineHook((uint32_t) addr_call_function) == ELE7EN_OK) {
__android_log_print(4, "hookso", "hook linker->call_constructors success!");
//return -1;
}
}
看雪ID:无造
https://bbs.pediy.com/user-home-571058.htm
*本文由看雪论坛 无造 原创,转载请注明来自看雪社区。
好消息!!现在看雪《安卓高级研修班》线下班 & 网课(12月班)开始同步招生啦!以前没报上高研班的小伙伴赶快抓紧机会报名,升职加薪唾手可得!!
推荐文章++++
求分享
求点赞
求在看
本文始发于微信公众号(看雪学院):Frida和Xposed打印init_array的字符串解密函数
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论