Back to Browse

Solving OWASP MSTG Android crackme level 2 using Frida

3.1K views
Dec 27, 2022
18:19

#mstg #crackmes #androidpentesting #android #frida #hooking #mobilesecurity #reverseengineering #java #apktool #arm64 In this video, we are going to learn how to use Frida dynamic instrumentation framework to hook native code at instruction level to extract the secret text. This video is a continuation of previous video where we have bypassed root detection in order to make the app run on rooted device. If you have not yet watched that video do check that out first from here: https://youtu.be/4X_go9r4nxM For this video we have used level 2 android app from MSTG crackmes. Also as a side note if you are new to mobile app penetration testing and want to get started then MSTG (Mobile security testing guidelines) also known as MAS (Mobile application security) is the first thing I would recommend starting with. You can download the application directly from here: https://github.com/OWASP/owasp-mastg/tree/master/Crackmes/Android/Level_02 The script which we have used to bypass root detection in this video is available here: https://github.com/fatalSec/mas-crackme_solutions/tree/main If you enjoy watching our videos, then please like this video and subscribe to the channel. You can also follow us on twitter @SecFatal

Download

0 formats

No download links available.

Solving OWASP MSTG Android crackme level 2 using Frida | NatokHD