-
-
Save d3vilbug/41deacfe52a476d68d6f21587c5f531d to your computer and use it in GitHub Desktop.
#!/usr/bin/env python3 | |
from __future__ import print_function | |
import frida | |
import sys | |
import json | |
import time | |
def on_message(message, payload): | |
if(message['type'] == 'send'): | |
rec_data = json.loads(message['payload']) | |
if rec_data['my_type'] == 'IV': | |
print("[$] IvParameterSpec :: {}".format(payload.decode('utf-8'))) | |
elif rec_data['my_type'] == 'KEY': | |
print("[$] SecretSpecKey :: {}".format(payload.decode('utf-8'))) | |
else: | |
print(message) | |
else: | |
print(message) | |
js_code = """ | |
console.log("Script loaded"); | |
Java.perform(function x() { | |
//hooking SecretKeySpec's constructor to get the SecretKeySpec | |
var secret_key_spec = Java.use("javax.crypto.spec.SecretKeySpec"); | |
secret_key_spec.$init.overload("[B", "java.lang.String").implementation = function (x, y) { | |
send('{"my_type" : "KEY"}', new Uint8Array(x)); | |
return this.$init(x, y); | |
} | |
//hooking IvParameterSpec's constructor to get the IV | |
var iv_parameter_spec = Java.use("javax.crypto.spec.IvParameterSpec"); | |
iv_parameter_spec.$init.overload("[B").implementation = function (x) { | |
send('{"my_type" : "IV"}', new Uint8Array(x)); | |
return this.$init(x); | |
} | |
}); | |
""" | |
# device = frida.get_usb_device() | |
# pid = device.spawn(["com.example.a11x256.frida_test"]) | |
# device.resume(pid) | |
# time.sleep(1) | |
# session = device.attach(pid) | |
session = frida.get_usb_device().attach('com.example.a11x256.frida_test') | |
script = session.create_script(js_code) | |
script.on("message", on_message) | |
script.load() | |
sys.stdin.read() |
gurtej741
commented
Oct 10, 2019
via email
The python code at link: https://11x256.github.io/Frida-hooking-android-part-5/
shows below error:
\\\\\\frida-AES-KEY-Script> .\frida-get-AES-keys_1.py
File "D:\Android Testing Stuff\frida-AES-KEY-Script\frida-get-AES-keys_1.py", line 16
print "Key sent to SecretKeySpec()", payload.encode("hex")
and did you also used the .js file from the same link?
Can you share your .js and .py files ??
Hello,
I was getting unfortunately application has stopped
did you found a solution?
Hi @Mr4FX
You can find the updated script from my blog post https://n00b.sh/posts/aes-killer-mobile-app-demo/
Ohhh sorry, haven't noticed. Responding on twitter
The python code at link: https://11x256.github.io/Frida-hooking-android-part-5/
shows below error: \\\frida-AES-KEY-Script> .\frida-get-AES-keys_1.py File "D:\Android Testing Stuff\frida-AES-KEY-Script\frida-get-AES-keys_1.py", line 16 print "Key sent to SecretKeySpec()", payload.encode("hex")
moved to here
https://infosec-blog.com/frida/android-reversing/Frida-hooking-android-part-5/