UnCrackable-Level2

UnCrackable-Level2

jadx打开

image-20230602225526738

同样是检测root

init()函数是native,ida打开对应so

最终导向这个函数

image-20230602225614075

创建子进程,然后附加到父进程,因此不能运行后注入

利用spawn创建进程后hook

1
2
3
4
5
6
7
8
9
10
11
12
13
console.log("Script loaded successfully ");
Java.perform(function(){
var b=Java.use("sg.vantagepoint.a.b");
b.a.overload().implementation = function(){
return false;
}
b.b.overload().implementation = function(){
return false;
}
b.c.overload().implementation = function(){
return false;
}
});
1
frida -U -f "owasp.mstg.uncrackable2" -l .\script.js --no-pause

image-20230602231111083

然后查看校验函数

image-20230602231147501

仍然是写在native里面

image-20230602231203647

ida打开

image-20230602231219213

找到“Thanks for all the fish”

image-20230602231721602

Thanks for all the fish