8000 GitHub - securitygrind/gadget-injector: gadget-inejctor let's you bypass SSL Pinning using the frida-gadget.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

securitygrind/gadget-injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Gadget Injector

This tool automatically injects the frida-gadget binary into an Android application (.apk format), in order to bypass SSL Pinning to intercept and decrypt the communication between the mobile client and the server.

The tool only tampers the application, post installation of apk, configuration of device and running frida needs to be done manually.

What does it do?

  1. Reverse engineer application with apktool.
  2. Inject frida-gadget.
  3. Inject smali hook.
  4. Increase application version.
  5. Re-build application with apktool.
  6. Align application with zipalign.
  7. Sign the application with apksigner.

Requirements

  1. python 2.7
  2. apktool
  3. openssl
  4. frida (+ frida-gadget binary)
  5. zipalign
  6. keytool
  7. apksigner

To complete the task, you will also need:
  1. Android Debug Bridge (part of Android SDK)
  2. Android emulation (i.e.: Genymotion).
  3. Proxy (i.e.: Burpsuite).

Usage

./gadget-injector.py -h

	-a, --target-apk	 The target apk file.
	-c, --proxy-cert	 The proxy's CA certificate file in DER format.
	-g, --frida-gadget	 The frida-gadget Android library.
	-r, --device-arch	 The device's architecture (i.e: x86).

./gadget-injector.py -a app.apk -c cacert.der -g frida-gadget-12.2.26-android-x86.so -r x86

[i] Converting DER to PEM...
[i] Decoding with apktool...
[i] Tampering yml file...
[+] Injecting frida-gadget...
[+] Injecting smali hook...
[i] Re-building application
[i] Zipaligning re-builded app
[+] Creating keystore...
[+] Signing with apksigner...
[+] TAMPERED APK HERE  -> path/to/apk-aligned-signed.apk	

After that, you need to:
  1. Install tampered apk on device.
  2. Configure device to use proxy (i.e.: Burpsuite)
  3. Run atmpered application.
  4. Run frida -U gadget -l frida-sslpinning.js
  5. Check proxy for intercepted traffic.

More on SSL pinning bypass with frida-gadget here.

Limitations

The tool was created for and tested for a limitted amount of Android applications, tweaking the code may be necessary to make it work under specific enviroment conditions.
The tool does not attempt to bypass integrity checks.

About

gadget-inejctor let's you bypass SSL Pinning using the frida-gadget.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0