![]() Edit the decompiled smali files and repackage it which is a daunting task as at times it becomes difficult to understand the decompiled code especially for newbies. ![]() Traditionally, if anybody wishes to modify a particular functionality they need to use one of the below methods Modifying the behavior of an Android application is desirable in instances where certain sensitive functionalities in app like Fingerprint Authentication is disabled or not allowed to run on rooted phones or you wish to bypass a Login screen or disable the SSL certificate pinning to intercept the traffic. This post focusses on the aspect of dynamically modifying the behavior of the app on runtime using a tool called Frida. No android application review goes without performing reverse engineering of the app to find out what's actually running in the background. In this blog post, Rohit Salecha guides newbie pentesters on how to use Frida to audit Android applications for security vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |