如下图所示,当别人在rom上改写了open.cpp函数,当发现打开/proc/cpuinfo文件时,会将其重定向到/system/ubin/cpuinfo 基我们自己定义的cpu ,同理内存/proc/memoryinfo,存储,也可以这样改写,比如某多多上的12G,512M的骁龙865,价格600多的平板,很可能就是这样改的。他会根据UID

if ((uid >= MINUID && uid <= MAXUID)) 来针对第三方的检测,当识别是第三方程序访问这些硬件变量时,就会重定向到一个指定的文件位置来实现模拟。

为了能检测出真实的设备,要在cpp文件中增加了svc的调用,相当于不通过libc的open函数打开/proc/cpuinfo,这样在libc中实现对openat的hook函数就无效了。见下面代码

这个函数更新时要运行一下ndk-build
app\src\main>ndk-build
如果增加了函数
要用\app\src\main>javah -d jni -classpath ./com.rom.cpptest
重新生成一下或者将鼠标放在新加的函数上,会有提示自动生成函数
#include <jni.h>
#include <string>
#include <fcntl.h>
#include "unistd.h"
#include <asm/unistd.h>
#include <android/log.h>
#define MAX_LINE 512
#define MAX_LENGTH 256
static const char *APPNAME = "MyReceiver";
#define LIBC "libc.so"
#define LOGI(...) __android_log_print(ANDROID_LOG_INFO, APPNAME, __VA_ARGS__)
#define LOGW(...) __android_log_print(ANDROID_LOG_WARN, APPNAME, __VA_ARGS__)
using namespace std;
#define __SYSCALL_LL_E(x) (x)
#define __SYSCALL_LL_O(x) (x)#define __asm_syscall(...) do { \__asm__ __volatile__ ( "svc 0" \: "=r"(x0) : __VA_ARGS__ : "memory", "cc"); \return x0; \} while (0)__attribute__((always_inline))
static inline long __syscall1(long n, long a)
{register long x8 __asm__("x8") = n;register long x0 __asm__("x0") = a;__asm_syscall("r"(x8), "0"(x0));
}__attribute__((always_inline))
static inline long __syscall3(long n, long a, long b, long c)
{register long x8 __asm__("x8") = n;register long x0 __asm__("x0") = a;register long x1 __asm__("x1") = b;register long x2 __asm__("x2") = c;__asm_syscall("r"(x8), "0"(x0), "r"(x1), "r"(x2));
}__attribute__((always_inline))
static inline long __syscall4(long n, long a, long b, long c, long d)
{register long x8 __asm__("x8") = n;register long x0 __asm__("x0") = a;register long x1 __asm__("x1") = b;register long x2 __asm__("x2") = c;register long x3 __asm__("x3") = d;__asm_syscall("r"(x8), "0"(x0), "r"(x1), "r"(x2), "r"(x3));
}
__attribute__((always_inline))
static inline int  my_openat(int __dir_fd, const void* __path, int __flags, int __mode ){return (int)__syscall4(__NR_openat, __dir_fd, (long)__path, __flags, __mode);
}__attribute__((always_inline))
static inline ssize_t my_read(int __fd, void* __buf, size_t __count){return __syscall3(__NR_read, __fd, (long)__buf, (long)__count);
}__attribute__((always_inline))
static inline int my_close(int __fd){return (int)__syscall1(__NR_close, __fd);
}static inline int  add_inline(int a,int b ){return (int) a+b+1;
}__attribute__((always_inline))
static inline bool  isRooted_use_svc_open( ){string a="/system";string b="bin";char infor[10];sprintf(infor,"/%s",b.c_str());string c="/su";string e=a+infor+c ;string d="/system/bin/su";int fd = my_openat(AT_FDCWD,e.c_str() , O_RDONLY | O_CLOEXEC, 0);if (fd > 0) {LOGI("root detect ");return true;} else{LOGI("root not detect ");return false;}
}__attribute__((always_inline))
static inline bool  isRooted_use_libc_open( ){string d="/system/bin/su";int fd = open( d.c_str() , O_RDONLY | O_CLOEXEC );if (fd > 0) {LOGI("root detect in isRooted_use_libc_open");return true;} else{LOGI("root not detect ");return false;}
}
__attribute__((always_inline))
static inline string  get_cpuinfor_svc( ){string path="/proc/cpuinfo";//libc 调用// int fd = open( d.c_str() , O_RDONLY | O_CLOEXEC );// svc 调用long fd = my_openat(AT_FDCWD, path.c_str(), O_RDONLY | O_CLOEXEC, 0);if (fd > 0) {char buffer[8];memset(buffer, 0, 8);std::string str;//int fd = open(path, O_RDONLY);//失败 -1;成功:>0 读出的字节数  =0文件读完了while (my_read(fd, buffer, 1) != 0) {//LOGI("读取文件内容  %s" ,buffer);str.append(buffer);}my_close(fd);return str;} else{LOGI("root not detect ");return "null";}
}__attribute__((always_inline))
static  string  get_cpuinfor_libc( ){string d="/proc/cpuinfo";int fd = open( d.c_str() , O_RDONLY | O_CLOEXEC );//int fd = my_openat(AT_FDCWD, d.c_str(), O_RDONLY | O_CLOEXEC, 0);if (fd > 0) {char buffer[1024];memset(buffer, 0, 1024);std::string str;//int fd = open(path, O_RDONLY);//失败 -1;成功:>0 读出的字节数  =0文件读完了//while (my_read(fd, buffer, 1) != 0) {while (read(fd, buffer, 1) != 0) {LOGI("读取文件内容  %s" ,buffer);str.append(buffer);}close(fd);return str;} else{LOGI("root not detect ");return "null";}
}extern "C" JNIEXPORT jstring JNICALL
Java_com_rom_cpptest_MainActivity_stringFromJNI(JNIEnv* env,jobject /* this */) {std::string hello = "Hello from C++ 你好中国";int fd = my_openat(AT_FDCWD, "/system/bin/su", O_RDONLY | O_CLOEXEC, 0);if (fd > 0) {LOGI("root detect ");} else{LOGI("root not detect ");}return env->NewStringUTF(hello.c_str());
}extern "C"
JNIEXPORT jint JNICALL
Java_com_rom_cpptest_MainActivity_add(JNIEnv *env, jobject thiz, jint a, jint b) {if(isRooted_use_libc_open()){LOGI("add函数中检测到root,可以进行上报,进行追封");}return  a+b;
}extern "C"
JNIEXPORT jboolean JNICALL
Java_com_rom_cpptest_MainActivity_detectRoot_1svc(JNIEnv *env, jobject thiz) {return isRooted_use_svc_open();
}extern "C"
JNIEXPORT jboolean JNICALL
Java_com_rom_cpptest_MainActivity_detectRoot_1libC(JNIEnv *env, jobject thiz) {// TODO: implement detectRoot_libC()return isRooted_use_libc_open();
}extern "C"
JNIEXPORT jstring JNICALL
Java_com_rom_cpptest_MainActivity_get_1cpuinfo_1svc(JNIEnv *env, jobject thiz) {// TODO: implement get_cpuinfo()return env->NewStringUTF(get_cpuinfor_svc().c_str());
}extern "C"
JNIEXPORT jstring JNICALL
Java_com_rom_cpptest_MainActivity_get_1cpuinfo_1libc(JNIEnv *env, jobject thiz) {// TODO: implement get_cpuinfo_libc()return env->NewStringUTF(get_cpuinfor_libc().c_str());
}

编译后,用ida发现static inline string get_cpuinfor_svc( )的汇编代码如下

而 static  string  get_cpuinfor_libc( )的汇编代码如下

当我们只hooki libc 函数open2时,是无法拦截到get_cpuinfor_svc()的,所以要基于svc代码进行拦截处理。

代码如下

svc_call_demo: 演示使用svc 调用openat和 libc下的openat的区别用于检测硬件的篡改信息

参考了

Frida-syscall-interceptor_fenfei331的博客-CSDN博客一、目标现在很多App不讲武德了,为了防止 openat 、read、kill 等等底层函数被hook,干脆就直接通过syscall的方式来做系统调用,导致无法hook。应对这种情况有两种方案:刷机重写系统调用表来拦截内核调用inline Hook SWI/SVC指令我们今天采用第二种方法,用frida来实现内联汇编SWI/SVC做系统调用, syscallfrida inline hookhook syscallfrida ArmWriterfrida typescript prhttps://blog.csdn.net/fenfei331/article/details/117920733Android 系统调用实现函数功能--SVC指令的实现与检测_Rorschach:Blog-CSDN博客0x0 简述: arm android中通过一些反编译的工具分析ELF文件时,根据一些导入的系统函数可以很轻松的找到一些功能代码的实现:查看libc中分析这些函数的实现: arm中通过SVC指令实现的系统调用因此利用这一点应用中加入了类似的实现操作,隐蔽掉调用系统函数的符号,增加分析难度: 0x1 实现: 以getpid为例修改调用方式,获取pid原本通过系统API getpid获取,修https://blog.csdn.net/u011247544/article/details/76427571

时间关系没太深入研究

附上python调用代码和 js代码

import frida
import sys
import time
import io
#代码可以直接写入下面,但是可读性不好
jscode = """
Java.perform(function () {});
"""
def printMessage(message,data):if message['type'] == 'send':print('[*] {0}'.format(message['payload']))# file_object = open("e:\\log.txt", 'ab+')# file_object.write(message['payload'].encode())# file_object.write('\n'.encode())# file_object.close()else:print(message)device = frida.get_usb_device()
front_app = device.get_frontmost_application()
#下面要输入你应用的包名
pid = device.spawn(["com.rom.cpptest"])
device.resume(pid)
#这里必须要有个延迟不然获取不到front_app,时间跟据自己机型调整
time.sleep(18)
front_app = device.get_frontmost_application()if front_app is  None:print("请运行要hook的应用")exit(0)print(front_app)
print(front_app.name)
process = device.attach(front_app.name)#process = frida.get_usb_device().attach('cpptest')
#直接读入sotest.js,在pycharm中代码有颜色感知,易于编辑
with open('./_agent.js',encoding='utf-8') as f:jscode = f.read()
script = process.create_script(jscode)#script = process.create_script(jscode)
script.on('message',printMessage)
script.load()
sys.stdin.read()
(function(){function r(e,n,t){function o(i,f){if(!n[i]){if(!e[i]){var c="function"==typeof require&&require;if(!f&&c)return c(i,!0);if(u)return u(i,!0);var a=new Error("Cannot find module '"+i+"'");throw a.code="MODULE_NOT_FOUND",a}var p=n[i]={exports:{}};e[i][0].call(p.exports,function(r){var n=e[i][1][r];return o(n||r)},p,p.exports,r,e,n,t)}return n[i].exports}for(var u="function"==typeof require&&require,i=0;i<t.length;i++)o(t[i]);return o}return r})()({1:[function(require,module,exports){
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
const logger_1 = require("./logger");
const frida_syscall_interceptor_1 = require("../../frida-syscall-interceptor");
const frida_syscall_interceptor_2 = require("../../frida-syscall-interceptor");
/*
const header = Memory.alloc(16);
header.writeU32(0xdeadbeef).add(4).writeU32(0xd00ff00d).add(4).writeU64(uint64("0x1122334455667788"));
log(hexdump(header.readByteArray(16) as ArrayBuffer, { ansi: true }));Process.getModuleByName("libSystem.B.dylib").enumerateExports().slice(0, 16).forEach((exp, index) => {log(`export ${index}: ${exp.name}`);});Interceptor.attach(Module.getExportByName(null, "open"), {onEnter(args) {const path = args[0].readUtf8String();log(`open() path="${path}"`);}
});
*/
// Somewhere in your code.
//*
let baseAddr = Module.findBaseAddress('libnative-lib.so');
//指令的地址 这个地址会随着你自己编译的apk变化的,
// 如果hook一次后备份的地址会变化,要重新启动一下应用
// let address = baseAddr.add('0x81F8'); //  00 00 00 EF <= SVC  0// hook openat /system/bin/su
let address1 = baseAddr.add('0xf1cc');//hook openat /system/bin/su
logger_1.log("cpu "+Process.arch);
frida_syscall_interceptor_1.hookSyscall(address1, new NativeCallback(function (dirfd, pathname, mode, flags) {let path = pathname.readCString();logger_1.log(`Called openat hook` );logger_1.log('- R0: ' + dirfd);logger_1.log('- R1: ' + path);logger_1.log('- R2: ' + mode);logger_1.log('- R3: ' + flags);return 0;
}, 'int', ['int', 'pointer', 'int', 'int']));//如果出异常,重启动一下手机,一次只能hook一个函数
//__NR_read, __fd, (long)__buf, (long)__count
// let address2 = baseAddr.add('0x8520');
// let address2 = baseAddr.add('0xF588');
// frida_syscall_interceptor_2.hookSyscall(address2, new NativeCallback(function (dirfd, __buf, __count) {
//     let infor = __buf.readCString();
//     logger_1.log(`Called read hook` );
//     logger_1.log('- R0: ' + dirfd);
//     logger_1.log('- R1: ' + __buf +" string=> "+infor);
//     logger_1.log('- R2: ' + __count);
//     return 0;
// }, 'int', ['int', 'pointer', 'int']));// frida -U -l _agent.js com.fenfei.syscalldemo},{"../../frida-syscall-interceptor":4,"./logger":2}],2:[function(require,module,exports){
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.log = void 0;
function log(message) {console.log(message);
}
exports.log = log;},{}],3:[function(require,module,exports){
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
class SyscallCallback {constructor(frida, native) {this.frida = frida;this.native = native;}
}
exports.SyscallCallback = SyscallCallback;},{}],4:[function(require,module,exports){
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
const callback_1 = require("./callback");
let callbacks = [];
function hookSyscall(syscallAddress, callback) {if (Process.arch == 'arm') {const address = syscallAddress.sub(8);const instructions = address.readByteArray(20);if (instructions == null) {throw new Error(`Unable to read instructions at address ${address}.`);}console.log(" ==== old instructions ==== " + address);console.log(instructions);Memory.patchCode(address, 20, function (code) {let writer = null;writer = new ArmWriter(code, { pc: address });writer.putBranchAddress(createCallback(callback, instructions, address.add(20), syscallAddress));writer.flush();});console.log(" ==== new instructions ==== " + address);const instructionsNew = address.readByteArray(20);console.log(instructionsNew);}else {const address = syscallAddress.sub(12);const instructions = address.readByteArray(12);if (instructions == null) {throw new Error(`Unable to read instructions at address ${address}.`);}console.log(" ==== old instructions ==== " + address);console.log(instructions);Memory.patchCode(address, 16, function (code) {let writer = null;writer = new Arm64Writer(code, { pc: address });writer.putBranchAddress(createCallback(callback, instructions, address.add(16), syscallAddress));writer.flush();});console.log(" ==== new instructions ==== " + address);const instructionsNew = address.readByteArray(12);console.log(instructionsNew);}
}
exports.hookSyscall = hookSyscall;
function createCallback(callback, instructions, retAddress, syscallAddress) {// Create custom instructions.let frida = Memory.alloc(Process.pageSize);Memory.patchCode(frida, Process.pageSize, function (code) {let writer = null;if (Process.arch == 'arm') {writer = new ArmWriter(code, { pc: frida });// Restore argument instructions.            writer.putBytes(instructions);// FE 5F 2D E9 STMFD  SP!, {R1-R12,LR} 寄存器入栈 不存 r0// FF 5F 2D E9 STMFD  SP!, {R0-R12,LR} 寄存器入栈  writer.putInstruction(0xE92D5FFF);// 00 A0 0F E1 MRS R10, CPSR// 00 04 2D E9 STMFD SP!, {R10}    // 状态寄存器入栈writer.putInstruction(0xE10FA000);writer.putInstruction(0xE92D0400);// instructions.size = 20  + 5条指令writer.putLdrRegAddress("lr", frida.add(20 + 5 * 4));writer.putBImm(callback);// 00 04 BD E8  LDMFD SP!, {R10}   // 状态寄存器出栈     // 0A F0 29 E1  MSR CPSR_cf, R10writer.putInstruction(0xE8BD0400);writer.putInstruction(0xE129F00A);// FE 9F BD E8 LDMFD  SP!, {R1-R12,PC}    寄存器出栈 不存 r0// FF 5F BD E8 LDMFD  SP!, {R0-R12,LR}    寄存器出栈 writer.putInstruction(0xE8BD5FFF);}else {writer = new Arm64Writer(code, { pc: frida });// Restore argument instructions.writer.putBytes(instructions);// Push all registers except x0.writer.putPushRegReg('x15', 'x1');writer.putPushRegReg('x2', 'x3');writer.putPushRegReg('x4', 'x5');writer.putPushRegReg('x6', 'x7');writer.putPushRegReg('x8', 'x9');writer.putPushRegReg('x10', 'x11');writer.putPushRegReg('x12', 'x13');writer.putPushRegReg('x14', 'x15');writer.putPushRegReg('x16', 'x17');writer.putPushRegReg('x18', 'x19');writer.putPushRegReg('x20', 'x21');writer.putPushRegReg('x22', 'x23');writer.putPushRegReg('x24', 'x25');writer.putPushRegReg('x26', 'x27');writer.putPushRegReg('x28', 'x29');writer.putInstruction(0xd53b420f); // 保存状态寄存器writer.putPushRegReg('x30', 'x15');// Call native.writer.putLdrRegAddress('x16', callback);writer.putBlrReg('x16');// Pop all registers, except x0, so x0 from native call gets used.writer.putPopRegReg('x30', 'x15');writer.putInstruction(0xd51b420f); // 还原状态寄存器writer.putPopRegReg('x28', 'x29');writer.putPopRegReg('x26', 'x27');writer.putPopRegReg('x24', 'x25');writer.putPopRegReg('x22', 'x23');writer.putPopRegReg('x20', 'x21');writer.putPopRegReg('x18', 'x19');writer.putPopRegReg('x16', 'x17');writer.putPopRegReg('x14', 'x15');writer.putPopRegReg('x12', 'x13');writer.putPopRegReg('x10', 'x11');writer.putPopRegReg('x8', 'x9');writer.putPopRegReg('x6', 'x7');writer.putPopRegReg('x4', 'x5');writer.putPopRegReg('x2', 'x3');writer.putPopRegReg('x15', 'x1');}// Call syscall.// writer.putInstruction(0xd4000001);writer.putBranchAddress(retAddress);writer.flush();});console.log("==== frida ====");console.log(frida);console.log("==== retAddress ====");console.log(retAddress);// Store callback so it doesn't get garbage collected.callbacks.push(new callback_1.SyscallCallback(frida, callback));// Return pointer to the instructions.return callbacks[callbacks.length - 1].frida;
}},{"./callback":3}]},{},[1])
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"sources":["node_modules/browser-pack/_prelude.js","agent/index.ts","agent/logger.ts","../frida-syscall-interceptor/dist/callback.js","../frida-syscall-interceptor/dist/index.js"],"names":[],"mappings":"AAAA;;;ACAA,qCAA+B;AAC/B,+EAA8D;AAG9D;;;;;;;;;;;;;;;;;;;;;EAqBE;AAEF,0BAA0B;AAE1B,GAAG;AACH,IAAI,QAAQ,GAAG,MAAM,CAAC,eAAe,CAAC,kBAAkB,CAAE,CAAC;AAC3D,IAAI,OAAO,GAAG,QAAQ,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAG,8BAA8B;AAEtE,YAAG,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;AAElB,uCAAW,CAAC,OAAO,EAAE,IAAI,cAAc,CAAC,UAAU,KAAK,EAAE,QAAQ,EAAE,IAAI,EAAE,KAAK;IAC1E,IAAI,IAAI,GAAG,QAAQ,CAAC,WAAW,EAAE,CAAC;IAElC,YAAG,CAAC,oBAAoB,CAAC,CAAC;IAC1B,YAAG,CAAC,QAAQ,GAAG,KAAK,CAAC,CAAC;IACtB,YAAG,CAAC,QAAQ,GAAG,IAAI,CAAC,CAAC;IACrB,YAAG,CAAC,QAAQ,GAAG,IAAI,CAAC,CAAC;IACrB,YAAG,CAAC,QAAQ,GAAG,KAAK,CAAC,CAAC;IAEtB,OAAO,CAAC,CAAC;AACb,CAAC,EAAE,KAAK,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC;AAC7C,KAAK;AAIL,+CAA+C;;;;;;AClD/C,SAAgB,GAAG,CAAC,OAAe;IAC/B,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;AACzB,CAAC;AAFD,kBAEC;;;ACFD,YAAY,CAAC;AACb,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;AAC9D,MAAM,eAAe;IACjB,YAAY,KAAK,EAAE,MAAM;QACrB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QACnB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;IACzB,CAAC;CACJ;AACD,OAAO,CAAC,eAAe,GAAG,eAAe,CAAC;;;ACR1C,YAAY,CAAC;AACb,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;AAC9D,MAAM,UAAU,GAAG,OAAO,CAAC,YAAY,CAAC,CAAC;AACzC,IAAI,SAAS,GAAG,EAAE,CAAC;AACnB,SAAS,WAAW,CAAC,cAAc,EAAE,QAAQ;IACzC,IAAI,OAAO,CAAC,IAAI,IAAI,KAAK,EAAE;QACvB,MAAM,OAAO,GAAG,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,YAAY,GAAG,OAAO,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;QAC/C,IAAI,YAAY,IAAI,IAAI,EAAE;YACtB,MAAM,IAAI,KAAK,CAAC,0CAA0C,OAAO,GAAG,CAAC,CAAC;SACzE;QACD,OAAO,CAAC,GAAG,CAAC,8BAA8B,GAAG,OAAO,CAAC,CAAC;QACtD,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAC1B,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,EAAE,EAAE,UAAU,IAAI;YACxC,IAAI,MAAM,GAAG,IAAI,CAAC;YAClB,MAAM,GAAG,IAAI,SAAS,CAAC,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,CAAC,CAAC;YAC9C,MAAM,CAAC,gBAAgB,CAAC,cAAc,CAAC,QAAQ,EAAE,YAAY,EAAE,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,cAAc,CAAC,CAAC,CAAC;YACjG,MAAM,CAAC,KAAK,EAAE,CAAC;QACnB,CAAC,CAAC,CAAC;QACH,OAAO,CAAC,GAAG,CAAC,8BAA8B,GAAG,OAAO,CAAC,CAAC;QACtD,MAAM,eAAe,GAAG,OAAO,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;QAClD,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;KAChC;SACI;QACD,MAAM,OAAO,GAAG,cAAc,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QACvC,MAAM,YAAY,GAAG,OAAO,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;QAC/C,IAAI,YAAY,IAAI,IAAI,EAAE;YACtB,MAAM,IAAI,KAAK,CAAC,0CAA0C,OAAO,GAAG,CAAC,CAAC;SACzE;QACD,OAAO,CAAC,GAAG,CAAC,8BAA8B,GAAG,OAAO,CAAC,CAAC;QACtD,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAC1B,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,EAAE,EAAE,UAAU,IAAI;YACxC,IAAI,MAAM,GAAG,IAAI,CAAC;YAClB,MAAM,GAAG,IAAI,WAAW,CAAC,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,CAAC,CAAC;YAChD,MAAM,CAAC,gBAAgB,CAAC,cAAc,CAAC,QAAQ,EAAE,YAAY,EAAE,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,cAAc,CAAC,CAAC,CAAC;YACjG,MAAM,CAAC,KAAK,EAAE,CAAC;QACnB,CAAC,CAAC,CAAC;QACH,OAAO,CAAC,GAAG,CAAC,8BAA8B,GAAG,OAAO,CAAC,CAAC;QACtD,MAAM,eAAe,GAAG,OAAO,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;QAClD,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;KAChC;AACL,CAAC;AACD,OAAO,CAAC,WAAW,GAAG,WAAW,CAAC;AAClC,SAAS,cAAc,CAAC,QAAQ,EAAE,YAAY,EAAE,UAAU,EAAE,cAAc;IACtE,8BAA8B;IAC9B,IAAI,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IAC3C,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,OAAO,CAAC,QAAQ,EAAE,UAAU,IAAI;QACpD,IAAI,MAAM,GAAG,IAAI,CAAC;QAClB,IAAI,OAAO,CAAC,IAAI,IAAI,KAAK,EAAE;YACvB,MAAM,GAAG,IAAI,SAAS,CAAC,IAAI,EAAE,EAAE,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;YAC5C,6CAA6C;YAC7C,MAAM,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;YAC9B,kDAAkD;YAClD,8CAA8C;YAC9C,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC;YAClC,4BAA4B;YAC5B,6CAA6C;YAC7C,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC;YAClC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC;YAClC,iCAAiC;YACjC,MAAM,CAAC,gBAAgB,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,EAAE,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;YACrD,MAAM,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;YACzB,kDAAkD;YAClD,gCAAgC;YAChC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC;YAClC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC;YAClC,qDAAqD;YACrD,gDAAgD;YAChD,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC;SACrC;aACI;YACD,MAAM,GAAG,IAAI,WAAW,CAAC,IAAI,EAAE,EAAE,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;YAC9C,iCAAiC;YACjC,MAAM,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;YAC9B,gCAAgC;YAChC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;YAClC,MAAM,CAAC,aAAa,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YACjC,MAAM,CAAC,aAAa,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YACjC,MAAM,CAAC,aAAa,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YACjC,MAAM,CAAC,aAAa,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YACjC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC,CAAC,UAAU;YAC7C,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YACnC,eAAe;YACf,MAAM,CAAC,gBAAgB,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;YACzC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YACxB,kEAAkE;YAClE,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC,CAAC,UAAU;YAC7C,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;YAClC,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YAChC,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YAChC,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YAChC,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YAChC,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;SACpC;QACD,gBAAgB;QAChB,qCAAqC;QACrC,MAAM,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC;QACpC,MAAM,CAAC,KAAK,EAAE,CAAC;IACnB,CAAC,CAAC,CAAC;IACH,OAAO,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC;IAC/B,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;IACnB,OAAO,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;IACpC,OAAO,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACxB,sDAAsD;IACtD,SAAS,CAAC,IAAI,CAAC,IAAI,UAAU,CAAC,eAAe,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC,CAAC;IAChE,sCAAsC;IACtC,OAAO,SAAS,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC;AACjD,CAAC","file":"generated.js","sourceRoot":""}

结果图

缺点是不能对每一个inline的svc进行拦截,一次只能拦截一个

另外SVC的一些补充,在arm v8架构下SVC调用一定是把调用函数方法存在了x8寄存器上了,如下,scv #0 对应上面的x8寄存器的mov 值就是svc的调用方法。如下图close()函数对应的就是

 mov     x8, __NR_close

如下所示如下图openat()函数对应的就是

mov     x8, __NR_openat

所以我们找到svc 0,x8寄存器最后一次值就是SVC调用的函数名

如下图所示 #0x38对应的是56,

在unistd.h中找到56对应的值就是_NR_openat

下图中找到svc 0,x8寄存器最后一次值 为#0x3f

在unistd.h中找到0x3f=63对应的值就是_NR_read

这个要想自动解析出调用哪些值,实现起来还是要一定难度的。

frida hook svc调用相关推荐

  1. frida hook so层方法大全

    文章转载,仅供学习,如有需要请支持原文章创作:https://kevinspider.github.io/fridahookso/ 1.感谢 2. frida env https://github.c ...

  2. 转载:使用 frida hook 插件化 apk ( classloader )

    使用 frida hook 插件化 apk:https://bbs.pediy.com/thread-258772.htm 最近拿到一个XX视频apk样本,里面有视频.直播和小说,没有VIP只能试看3 ...

  3. frida hook java 函数_使用 Frida 来 Hook Java 类中的构造函数(构造函数带重载),获取解密后的js脚本...

    一个APP使用了Auto.js 的加密脚本.我们的任务是将其加密脚本进行解密并dump出来.在  https://www.52pojie.cn/thread-1112407-1-1.html 一文中, ...

  4. Frida Hook Android App 进阶用法之 Java 运行时

    FridaHookAndroid 本文旨在覆盖使用 Frida 对 Android App 进行 hook 的绝大多数场景.文章提到的所有代码以及被测 App,详见:https://github.co ...

  5. Frida hook零基础教程

    1. 环境搭建 1. 准备frida服务端环境 Releases · frida/frida · GitHub 根据手机具体版本下载对应文件并解压,Android手机一般是arm64架构.将解压后的f ...

  6. 安卓基于Frida HOOK传感器 实现虚拟运动跑步

    安卓基于Frida HOOK传感器 实现虚拟运动跑步 (本文运行环境:WIN10 + Pythom 3.6) 众所周知,安卓HOOK是十分厉害的的,所以有一天,我突发奇想能不能动态HOOK安卓的传感器 ...

  7. 【Frida】Frida Hook 实战 某 APK 的账号密码,并分析加密规则

    起序:学 安卓逆向 用到的 Frida 框架,小规模实战一波.起 了解 Frida 框架简单使用 的作用. 一.软件环境 测试 APK 是比较老的版本,因为从这个版本往上都是经过 加固 的,反编译不出 ...

  8. Frida Hook Java动态加载DEX方法

    Frida Hook动态加载的DEX里的方法,需要切换到ClassLoader下. Java package com.github.lastingyang.androiddemo.Activity;i ...

  9. frida hook实例

    上一篇简单介绍了frida安装,这一章说一下frida的简单调用,直接上代码 使用工具: rps.apk(这是一个石头剪刀布的游戏应用) mumu模拟器 rps.apk下载链接:https://pan ...

最新文章

  1. 搭建 数字证书_CA认证介绍及搭建过程
  2. const的使用 || 对象增强写法 (对象字面量)
  3. 数据结构与算法—一文多图搞懂双链表
  4. 关于Java性能监控您不知道的5件事
  5. 解决Oracle错误ORA-15061一例
  6. [随笔所想] 2021年新年碎碎念-加油了不起的干饭人!
  7. python动态调用函数
  8. IAR下载并创建Example工程
  9. 看看什么叫穿越失败,我承认我确实笑了
  10. WordPress the_excerpt()截取摘要长度
  11. 关于微信小程序开发过程中的页面刷新的解决方案
  12. react native (Error: Unable To Find Utility “Instruments“, Not A Developer Tool)
  13. 深度学习入门之python读取图片转化为向量
  14. 淘口令高级版api,淘口令转化api,淘口令api,高级淘口令效果,高级淘口令使用场景
  15. 13.8万亿的自动驾驶出租车市场, 这个钱能站着挣了吗?
  16. Java项目中使用spring (annotation)
  17. 自我介绍html模板王,自我介绍模板600字
  18. UPP协议转AXI4协议的burst读写FPGA实现
  19. 【系统生物学】大肠杆菌蛋白互作网络分析(系统与合成生物学第三次作业)
  20. javacv开发详解补充篇:解决转流后视频画面快进慢放,时间跳动过大,监控视频时间戳重新计算pts和dts

热门文章

  1. OSG学习:OSG组成(二)——渲染状态和纹理映射
  2. piblic class 和class的区别
  3. ceph---ceph osd DNE状态对集群的影响
  4. win10使用administrator登录却仍然没权限
  5. IE和标准下有哪些兼容性的写法
  6. 关于错误 Unhandled exception in (KERNEL32.DLL):0xE06D7363:Microsoft C++ Exce vc and access insert 记录
  7. Revit API 2018调试闪退
  8. 【故事】《阿里云的这群疯子》:深度好文阅读推荐
  9. 计算机上DEL和INS怎么转换,HGVS命名之【缺失插入】Deletion-insertion (delins/indel)
  10. Keil MDK5工程文件不可修改(文件符号上带一个黄色的钥匙)