-
Notifications
You must be signed in to change notification settings - Fork 124
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Why the breakpoint doesn't work? #310
Comments
Hi there, Frida-trace is setting interceptor hooks to trace the symbol. On r2frida, you should use [0x7ab47ee000]> \il~crypt
0x0000007d5d646000 libcrypto.so
0x0000007ab47ee000 libjavacrypto.so
0x0000007ab48cf000 libcrypto.so
[0x7ab47ee000]> s 0x0000007ab47ee000
[0x7ab47ee000]> \ii~+EVP_aes
0x7d5d71b02c f EVP_aes_128_cbc /system/lib64/libcrypto.so
0x7d5d71b058 f EVP_aes_128_ctr /system/lib64/libcrypto.so
0x7d5d71b23c f EVP_aes_128_ecb /system/lib64/libcrypto.so
0x7d5d71b0b0 f EVP_aes_128_gcm /system/lib64/libcrypto.so
0x7d5d71b0dc f EVP_aes_192_cbc /system/lib64/libcrypto.so
0x7d5d71b108 f EVP_aes_192_ctr /system/lib64/libcrypto.so
0x7d5d71b268 f EVP_aes_192_ecb /system/lib64/libcrypto.so
0x7d5d71b160 f EVP_aes_192_gcm /system/lib64/libcrypto.so
0x7d5d71b18c f EVP_aes_256_cbc /system/lib64/libcrypto.so
0x7d5d71b1b8 f EVP_aes_256_ctr /system/lib64/libcrypto.so
0x7d5d71b294 f EVP_aes_256_ecb /system/lib64/libcrypto.so
0x7d5d71b210 f EVP_aes_256_gcm /system/lib64/libcrypto.so
[0x7ab47ee000]> \dtf 0x7d5d71b02c
true
[0x7ab47ee000]> \dc Regarding this command below, this syntax could be improved, is this symbol recognized inside of the r2 shell? Probably \db EVP_EncryptUpdate |
Hi, @enovella. attempt 1 attempt 2 attempt 3 Do I understand correctly that this means that the breakpoint is triggered, but the application protection prevents this? |
Regarding attempts:
I cannot answer the last question, we need to dig deeper into the logs to figure out what's going on underneath. Good luck! |
Thank you for your explanation. |
Hello.
Please help me understand. When I run the command:
frida-trace com. instagram. android-i "EVP_EncryptUpdate*"
Next, I scroll in the app, frida-trace shows me the calls to this function.
When I run such a sequence of commands:
r2 frida://spawn/usb//com.instagram.android
[0x00000000]> \db EVP_EncryptUpdate
[0x00000000]> \dt EVP_EncryptUpdate
[0x00000000]> \dc
resumed spawned process.
When I scroll in the app, nothing happens.
What am I doing wrong?
Host system:
Linux debian 5.10.0-4-amd64 #1 SMP Debian 5.10.19-1 (2021-03-02) x86_64 GNU/Linux
[[0x00000000]> ?V
4.6.0-gitaka 4.4.0-925-g14f82ee30 commit 25261
Target system:
[[0x00000000]> \i
arch arm
bits 32
os linux
pid 11714
aid 10204
obj c false
runtime QJS
java true
mainLoop false
pageSize 4096
pointer Size 4
code Signing Policy optional
isDebuggerAttached false
The text was updated successfully, but these errors were encountered: