objection
Info
ΠΠ°ΠΏΠΈΡΠ°Π½ΠΈΠ΅ ΠΏΠ»Π°Π³ΠΈΠ½ΠΎΠ²
name_plugin/ - <name_plugin> - Π½Π°Π·Π²Π°Π½ΠΈΠ΅ ΠΏΠ»Π°Π³ΠΈΠ½Π°
__init__.py - ΠΊΠΎΠ΄objection --gadget "ru.sberbank.*" explore -P "/Users/**/Work/pentest/projects/**/scripts" -s "plugin bypass info"__description__ = "***: JB Bypass (***)"
from objection.utils.plugin import Plugin
s = """
rpc.exports = {
test: function() {
console.log("[+] Jailbreak Detection Bypass");
if (ObjC.available) {
try {
var module = "***"; // finded by frida-trace -U -f ru.sberbank.*** -i "sbf_***"
var functionName = "sbf_***";
var sbf_***_ptr = Module.findExportByName(module, functionName);
// var sbf_***_func = new NativeFunction(sbf_***_ptr, "bool", []);
Interceptor.attach(sbf_***_ptr, {
onLeave: function(retval) {
// console.log("[*] retval sbf_***(): " + retval);
var newretval = ptr("0x0");
retval.replace(newretval);
console.log("[*] *** bypass");
}
});
}
catch(err) {
console.log("[!] Exception2: " + err.message);
}
}
else {
console.log("Objective-C Runtime is not available!");
}
}
}
"""
class JBBypass(Plugin):
""" JBBypass is a plugin for bypass JB Detection (***) """
def __init__(self, ns):
"""
Creates a new instance of the plugin
:param ns:
"""
self.script_src = s
# self.script_path = os.path.join(os.path.dirname(__file__), "script.js")
implementation = {
'meta': 'JB Detection bypass',
'commands': {
'info': {
'meta': 'Get the current Frida version',
'exec': self.bypass
}
}
}
super().__init__(__file__, ns, implementation)
self.inject()
def bypass(self, args: list):
"""
"""
self.api.test()
# print('Frida version: {0}'.format(v))
namespace = 'bypass'
plugin = JBBypass
ΠΡΠΈΠΌΠ΅ΡΡ
ΠΠ°ΠΏΡΡΠΊ
ΠΠΎΠΈΡΠΊ ΠΈ ΠΏΠ΅ΡΠ΅Ρ
Π²Π°Ρ ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ²
watching
Search
ΠΡΡΠ³ΠΎΠ΅
Last updated