A Flutter reverse engineering tool that can be used to hook and intercept function calls. You require a Rooted android phone to use frida, or an android emulator with adb

Client Installation

Windows

pip install frida-tools The library is located at <pythonfolder>/Lib/site-packages/frida-tools The example scripts are located at: <pythonfolder>/Scripts/

Arch

sudo pacman -S python-frida python-frida-tools

Server Installation

AVD Setup

  1. Check the CPU architecture of the AVD device
  2. Download the correct server release off https://github.com/frida/frida/releases
  3. Unzip the xz file
  4. adb push <fridaserverfile> /data/local/tmp
  5. adb shell
  6. su
  7. cd /data/local/tmp
  8. chmod 755 <fridaserverfile>
  9. ./<fridaserver> &

Starting Frida

  1. Use Blutter to create blutter_frida.js
  2. Modify blutter_frida.js to remove the warning and to modify the hook

Emulated Device

  1. Run the app on the emulator
  2. frida-ps -Ua to view appname
  3. frida -U <appname> -l blutter_frida.js

Tools

  • frida-ps -U - show all running processes
  • frida-ps -Ua - show all running applications
  • frida-ps -Uia - show all running and not running applications
  • frida -U -f <app>.apk -l <script>.js

Frida Commands

  • Module.enumerateExports("libapp.so")- prints all the exported functions and variables along with their address in memory