LogoLogo
  • About Me
  • Notes
    • Android Pentesting
      • First Android App
      • ADB
      • The INTERNET Permission
      • Installing Certificate in User Store
      • Installing system certificates
      • Install system certificates on android 14
      • apktool (for patching and decompiling)
      • Advanced Network interception using VPN
      • DNS Spoofing and Transparent Proxy
      • HTTP Mock
      • APK
      • Static analysis
        • Getting APK from a Device
      • Case Study: A Weather App
      • Frida & Objection
      • Frida Scripts
        • Tracing Activities
        • Tracing Fragments
      • Frida Trace
      • SSL Validation Bypasses
Powered by GitBook
On this page

Was this helpful?

  1. Notes
  2. Android Pentesting

Frida Trace

  • frida also comes with a tool called frida-trace which trace function calls in the application.

  • In frida-trace we need to instrument each functions due to which we have to specifically tell frida-trace the exact function of the classname which we have to trace calls for but the best part is we can use wildcard (*)

  • the format is classname!methodname

  • To trace all function all packages under io.hextree.*

    • frida-trace -U -j 'io.hextree.*!*' <app_name_or_package_name>

  • To trace all function all packages under io.hextree.* but remove all things under Annoying class

    • frida-trace -U -j 'io.hextree.*!*' -J '*AnnoyingClass*!*' <app_name_or_package_name>

Tracing into JNI

  • To trace into JNI also frida-trace requires the shared library name proceeded by -I

    • frida-trace -U -I 'libhextree.so' -j 'io.hextree.*!*' <app_name_or_package_name>

      • This command not worked as expected. Will look into this later.


PreviousTracing FragmentsNextSSL Validation Bypasses

Last updated 2 days ago

Was this helpful?