Tracing Instructions & Intercepting System Calls
#syscalls #svc #frida #stalker #ghidra #android #pentest Welcome to FatalSec! 🔥 In this deep dive, we’re exploring advanced techniques for Android app pentesting using Frida Stalker. You’ll learn how to trace the runtime instructions of an app, making it possible to see exactly what's being executed step-by-step. We’ll also demonstrate how to parse registers and memory by tracing SVC instructions, allowing you to identify system call numbers and inspect function arguments as they’re called. Whether you’re a pentesting pro or just getting started, this video will equip you with powerful methods to uncover hidden behaviors in Android apps. Watch and level up your pentesting skills! 💻 🔔 **Don’t forget to like, subscribe, and hit the bell icon** for more in-depth tutorials on Android and iOS security, mobile app pentesting, and beyond! You can download the sample app from here: https://github.com/fatalSec/android_in_app_protections/blob/main/adv_frida.apk ARM64 system call table: https://chromium.googlesource.com/chromiumos/docs/+/master/constants/syscalls.md#arm64-64_bit Previous Frida detection bypass techniques: https://youtu.be/FNtzJDU5BAI **Connect with us on:** X: @SecFatal Telegram: https://t.me/SecFatal Mail: [email protected] You can also support us by buying a cup of coffee: http://buymeacoffee.com/secfatalz
Download
0 formatsNo download links available.