This is solution to OWASP MSTG Crack Me Level 1 using dynamic binary instrumentation framework - Frida.
Please check my youtube video for detailed walkthrough.
Challenge 1.1 - Bypass the root & debug detection
Please pause the video and think of a way to bypass it
Multiple ways to bypass this
● Hook each function c.a() , c.b() , c.c() and b.a() and return false.
Multiple ways to bypass this
● Hook each function c.a() , c.b() , c.c() and b.a() and return false.
● Hook the function a() and change the implementation of it.
Multiple ways to bypass this
● Hook each function c.a() , c.b() , c.c() and b.a() and return false.
● Hook the function a() and change the implementation of it.
● Hook the onClickListener() function of the button and change its
implementation.
Multiple ways to bypass this
● Hook each function c.a() , c.b() , c.c() and b.a() and return false.
● Hook the function a() and change the implementation of it.
● Hook the onClickListener() function of the button and change its
implementation.
● Hook the java.lang.System class and change exit() function’s
implementation.
Multiple ways to bypass this
● Hook each function c.a() , c.b() , c.c() and b.a() and return false.
● Hook the function a() and change the implementation of it.
● Hook the onClickListener() function of the button and change its
implementation.
● Hook the java.lang.System class and change exit() function’s
implementation.
PLEASE DON’T FORGET TO HIT THE LIKE BUTTON.
FOR MORE VIDEOS, PLEASE SUBSCRIBE TO MY CHANNEL.
IF YOU HAVE ANY DOUBTS PLEASE LEAVE IT IN THE COMMENTS SECTION.