-
Happy to give away the material of the advanced training "Mobile Reverse Engineering with R2frida" to
@CaptnBanana for his blog post "Dynamic Instrumentation: Frida and#r2frida for Noobs". Keep up the great work mate! Contact any of the trainers for the link :) pic.twitter.com/kdLRvmpxDz
Prikaži ovu nit -
Call code from an alive process with
#r2frida via \dxc (Dynamic eXecute Code). For instance, let's call getpid() from libc and then verify the pid with the#r2frida cmd \dp. Any cool function to arbitrarily call from your target? Go and#r2frida it! pic.twitter.com/7KJcXeLIM8
-
Radare2 and (F|Gh)rida, Better together! Solving the Android Uncrackable CrackMe Level 2 with
#r2frida. http://tiny.cc/hlsrdz (@OWASP_MSTG). Solutions were updated. -
Learning a lot of
#r2frida this week with protected APKs. It's amazing how you can leverage the union of@radareorg(static) and@fridadotre(dynamic). The pic illustrates how to find root checks and disassemble it in Thumb mode. At runtime, we observe string deobfuscation going onpic.twitter.com/OQ4wsRtOkq
-
Switf5 demangling is now supported on
@radareorg and#r2frida pic.twitter.com/sNUYoFbNff
-
Combo: Spawn the APK +
#Frida syscall hook (trampoline highlighted) +#r2frida breakpoint and BINGO! Obfuscators are improving a bit
. This week I am suffering "frida-ddiction" pic.twitter.com/mhigDQFBP4
-
Amazing talk at
#r2con2018 by@bezjaje about hacking a game by defeating obfuscation using#radare2 and#r2frida pic.twitter.com/tbniNk17B0
-
Training finished! We survived the
#r2frida training at#r2con2019! But we are already thinking in improvings for next year! Thanks@radareorg for this opportunity! //cc @enovella_ @Hexploitable pic.twitter.com/jDEt5Zl0L6
-
After some video issues...Lets start
#r2frida training at#r2con2019 with@enovella_ and@Hexploitable! //cc@radareorg@fridadotre pic.twitter.com/IOZO3sLnRc
-
Here it is! The recording of my 2h session introducing @radareorg at#HITB2019AMS, from zero up to#ESIL and#r2frida basics. https://www.youtube.com/watch?v=317dNavABKo … I hope it will be useful. Comments and feedback are totally welcomed :) CC:@HITBSecConf@l33tdawg@Ministraitor@trufae -
Who you gonna' syscall?
@radareorg#r2con2019 Reversing hardened iOS apps with#r2frida pic.twitter.com/u5wa2X9BdH
-
Very nice slides about Mobile Pentesting with
@fridadotre . Solving the@OWASP_MSTG Crackmes and Hacking playground with Frida +#r2frida Excellent work!
@lain7z@martrudix https://github.com/OWASP/MSTG-Hacking-Playground/releases …https://twitter.com/lain7z/status/1180166905811877890 … -
Slides from
#r2con2017#R2Frida (now integrated into our#MobileApp#PenTesting software) talk by@bezjaje:https://github.com/radareorg/r2con-2017/blob/master/talks/r2frida/r2frida-r2con-2017.pdf … -
For MSTG-STORAGE-10, we used
#r2frida to search for the "owasp-mstg" string written in a password field. In this snippet we map the search results#r2hits
to their location in the memory regions -> \dm. @@ hit1_* #r2magic
@radareorg@fridadotre@OWASP_MSTG#r2con2019pic.twitter.com/3ZGU7FIbY0 -
Building the best
#StaticAnalysis &#DynamicAnalysis:@bezjaje on@fridadotre,@radareorg & new#R2Frida features - http://bit.ly/2mG1lgu pic.twitter.com/8hWhVlb9Y9
-
#radare2+#frida=#r2frida. Your Best Dynamic Debugging Tool http://2h0n9.com:40302/2019/12/21/radara-plus-frida-equals-r2friad-191221 … -
Blogpost: Radare advanced training "Mobile Reverse Engineering with R2frida" "Dynamic Instrumentation: Frida and
#r2frida for Noobs" https://bananamafia.dev/post/r2frida-1/ pic.twitter.com/CtRVYunwtG
-
The fu***** syscall maistah
@Hexploitable at the stage in#r2con2019. Lets do some#r2frida! //cc@radareorg pic.twitter.com/W4bZHwBsO8
-
\dxc is very helpful indeed. Solves a lot of my problems.
#r2Frida
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.