-
-
Save onewayticket255/94c1f58c5a84b8a09fe94aea3ee5a5eb to your computer and use it in GitHub Desktop.
This Frida script disables SSL pinning and verification on any target macOS Catalina process.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var SecTrustEvaluate_handle = | |
Module.findExportByName('Security', 'SecTrustEvaluate'); | |
var SecTrustEvaluateWithError_handle = | |
Module.findExportByName('Security', 'SecTrustEvaluateWithError'); | |
var SSL_CTX_set_custom_verify_handle = | |
Module.findExportByName('libboringssl.dylib', 'SSL_CTX_set_custom_verify'); | |
var SSL_get_psk_identity_handle = | |
Module.findExportByName('libboringssl.dylib', 'SSL_get_psk_identity'); | |
var boringssl_context_set_verify_mode_handle = Module.findExportByName( | |
'libboringssl.dylib', 'boringssl_context_set_verify_mode'); | |
if (SecTrustEvaluateWithError_handle) { | |
var SecTrustEvaluateWithError = new NativeFunction( | |
SecTrustEvaluateWithError_handle, 'int', ['pointer', 'pointer']); | |
Interceptor.replace( | |
SecTrustEvaluateWithError_handle, | |
new NativeCallback(function(trust, error) { | |
console.log('[*] Called SecTrustEvaluateWithError()'); | |
SecTrustEvaluateWithError(trust, NULL); | |
Memory.writeU8(error, 0); | |
return 1; | |
}, 'int', ['pointer', 'pointer'])); | |
console.log('[+] SecTrustEvaluateWithError() hook installed.'); | |
} | |
if (SecTrustEvaluate_handle) { | |
var SecTrustEvaluate = new NativeFunction( | |
SecTrustEvaluate_handle, 'int', ['pointer', 'pointer']); | |
Interceptor.replace( | |
SecTrustEvaluate_handle, new NativeCallback(function(trust, result) { | |
console.log('[*] Called SecTrustEvaluate()'); | |
SecTrustEvaluate(trust, result); | |
Memory.writeU8(result, 1); | |
return 0; | |
}, 'int', ['pointer', 'pointer'])); | |
console.log('[+] SecTrustEvaluate() hook installed.'); | |
} | |
if (SSL_CTX_set_custom_verify_handle) { | |
var SSL_CTX_set_custom_verify = new NativeFunction( | |
SSL_CTX_set_custom_verify_handle, 'void', ['pointer', 'int', 'pointer']); | |
var replaced_callback = new NativeCallback(function(ssl, out) { | |
console.log('[*] Called custom SSL verifier') | |
return 0; | |
}, 'int', ['pointer', 'pointer']); | |
Interceptor.replace( | |
SSL_CTX_set_custom_verify_handle, | |
new NativeCallback(function(ctx, mode, callback) { | |
console.log('[*] Called SSL_CTX_set_custom_verify()'); | |
SSL_CTX_set_custom_verify(ctx, 0, replaced_callback); | |
}, 'int', ['pointer', 'int', 'pointer'])); | |
console.log('[+] SSL_CTX_set_custom_verify() hook installed.') | |
} | |
if (SSL_get_psk_identity_handle) { | |
Interceptor.replace( | |
SSL_get_psk_identity_handle, new NativeCallback(function(ssl) { | |
console.log('[*] Called SSL_get_psk_identity_handle()'); | |
return 'notarealPSKidentity'; | |
}, 'pointer', ['pointer'])); | |
console.log('[+] SSL_get_psk_identity() hook installed.') | |
} | |
if (boringssl_context_set_verify_mode_handle) { | |
var boringssl_context_set_verify_mode = new NativeFunction( | |
boringssl_context_set_verify_mode_handle, 'int', ['pointer', 'pointer']); | |
Interceptor.replace( | |
boringssl_context_set_verify_mode_handle, | |
new NativeCallback(function(a, b) { | |
console.log('[*] Called boringssl_context_set_verify_mode()'); | |
return 0; | |
}, 'int', ['pointer', 'pointer'])); | |
console.log('[+] boringssl_context_set_verify_mode() hook installed.') | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment