Skip to content

Commit cd54dc3

Browse files
authored
Added various Scripts
The scripts do the following: File-Read: Track Access to files StringBuilder: Print generated strings for URLs and queries KeyStore: Track different Keystore access methods with their password SecretKeySpec: Log keys and their Keyspecs to find hardcoded values SQLiteHelper: Capture executed SQL statements
1 parent 463a5cd commit cd54dc3

5 files changed

+134
-0
lines changed

Android-File-Read.js

+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
Java.perform(function () {
2+
// Get a class handler of the File class
3+
// https://docs.oracle.com/javase/9/docs/api/java/io/File.html
4+
const file = Java.use('java.io.File');
5+
// Overload the constructor "File" to capture the input parameters
6+
file.$init.overload('java.lang.String').implementation = function (filename) {
7+
// Log the successful hook to fridas console
8+
console.log('[+] new file access operation found!');
9+
// Log the file path to the console
10+
console.log('Path: ' + filename);
11+
// Call the original function to keep the app working
12+
return this.$init(filename);
13+
}
14+
});

Android-KeyStore.js

+61
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
Java.perform(function () {
2+
// Get a class handler of the KeyStore class
3+
// https://docs.oracle.com/javase/9/docs/api/java/security/KeyStore.html
4+
const keyStore = Java.use('java.security.KeyStore');
5+
// Overload the method "getKey" to capture the input parameters
6+
keyStore.getKey.overload('java.lang.String','[C').implementation = function (alias, pass) {
7+
// Log the successful hook to fridas console
8+
console.log('[+] new getKey operation found!');
9+
console.log('Password: ' + pass.join(""));
10+
// Call the original function to keep the app working
11+
return this.getKey(alias, pass);
12+
}
13+
keyStore.getInstance.overload('java.lang.String').implementation = function (s) {
14+
// Log the successful hook to fridas console
15+
console.log('[+] new keyStore.getInstance operation found!');
16+
console.log('Content: ' + s);
17+
// Call the original function to keep the app working
18+
return this.getInstance(s);
19+
}
20+
keyStore.getInstance.overload('java.lang.String', 'java.security.Provider').implementation = function (s,p) {
21+
// Log the successful hook to fridas console
22+
console.log('[+] new keyStore.getInstance operation found!');
23+
console.log('Content: ' + s);
24+
// Call the original function to keep the app working
25+
return this.getInstance(s,p);
26+
}
27+
keyStore.getInstance.overload('java.lang.String', 'java.lang.String').implementation = function (s,s2) {
28+
// Log the successful hook to fridas console
29+
console.log('[+] new keyStore.getInstance operation found!');
30+
console.log('Content: ' + s);
31+
console.log('Content2: ' + s2);
32+
// Call the original function to keep the app working
33+
return this.getInstance(s,s2);
34+
}
35+
36+
keyStore.$init.overload('java.security.KeyStoreSpi', 'java.security.Provider', 'java.lang.String').implementation = function (keyStoreSpi, securityProvider, s) {
37+
// Log the successful hook to fridas console
38+
console.log('[+] new keyStore.$init operation found!');
39+
// Call the original function to keep the app working
40+
return this.$init(keyStoreSpi, securityProvider, s);
41+
}
42+
43+
keyStore.store.overload('java.io.OutputStream','[C').implementation = function (outputStream, pass) {
44+
// Log the successful hook to fridas console
45+
console.log('[+] new keyStore.store operation found!');
46+
console.log('Password: ' + pass.join(""));
47+
// Call the original function to keep the app working
48+
return this.store(outputStream, pass);
49+
}
50+
keyStore.load.overload('java.io.InputStream','[C').implementation = function (inputStream, pass) {
51+
// Log the successful hook to fridas console
52+
console.log('[+] new keyStore.load operation found!');
53+
if(pass != null)
54+
{
55+
console.log('Password Length: ' + pass.length());
56+
console.log('Password: ' + pass.join(""));
57+
}
58+
// Call the original function to keep the app working
59+
return this.load(inputStream, pass);
60+
}
61+
});
+13
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
Java.perform(function () {
2+
// Get a class handler of the SQLiteDatabase class
3+
// https://developer.android.com/reference/android/database/sqlite/SQLiteDatabase
4+
const sQLiteDatabase = Java.use('android.database.sqlite.SQLiteDatabase');
5+
// Overload the method "executeSql" to capture the input parameters
6+
sQLiteDatabase.executeSql.overload('java.lang.String','[Ljava.lang.Object;').implementation = function (query, object) {
7+
// Log the successful hook to fridas console
8+
console.log('[+] new SQLite Statement captured!');
9+
console.log('Query: '+ query);
10+
// Call the original function to keep the app working
11+
return this.executeSql(query, object);
12+
}
13+
});

Android-SecretKeySpec.js

+33
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
Java.perform(function () {
2+
// Get a class handler of the SecretKeySpec class
3+
// https://developer.android.com/reference/javax/crypto/spec/SecretKeySpec
4+
var SecretKeySpec = Java.use('javax.crypto.spec.SecretKeySpec');
5+
// Overload the method "$init" to capture the input parameters
6+
SecretKeySpec.$init.overload('[B', 'java.lang.String').implementation = function(bytes, keyspec) {
7+
// Log the successful hook to fridas console
8+
console.log('SecretKeySpec.$init("' + bytes2hex(bytes) + '", "' + keyspec + '")');
9+
// Call the original function to keep the app working
10+
return this.$init(bytes, keyspec);
11+
};
12+
});
13+
14+
// This function converts the byte array to a hex array
15+
function bytes2hex(array) {
16+
var result = '';
17+
console.log('len = ' + array.length);
18+
for(var i = 0; i < array.length; ++i)
19+
result += ('0' + (array[i] & 0xFF).toString(16)).slice(-2);
20+
return result;
21+
}
22+
23+
// This function can be used inside Java.perform to enumerate strings being used as keys
24+
// WARNING: Non printable characters may crash the frida server
25+
function hex2ascii(str1)
26+
{
27+
var hex = str1.toString();
28+
var str = '';
29+
for (var n = 0; n < hex.length; n += 2) {
30+
str += String.fromCharCode(parseInt(hex.substr(n, 2), 16));
31+
}
32+
return str;
33+
}

Android-StringBuilder.js

+13
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
Java.perform(function () {
2+
// Get a class handler of the StringBuilder class
3+
// https://docs.oracle.com/javase/10/docs/api/java/lang/StringBuilder.html
4+
const stringBuilder = Java.use('java.lang.StringBuilder');
5+
// Overload the method "toString" to capture the input parameters
6+
stringBuilder.toString.overload().implementation = function () {
7+
// Log the successful hook to fridas console
8+
console.log('[+] stringBuilder.toString found!');
9+
console.log('Content: ' + this.toString());
10+
// Call the original function to keep the app working
11+
return this.toString();
12+
}
13+
});

0 commit comments

Comments
 (0)