juliangrtz/frida-antiantijb
GitHub: juliangrtz/frida-antiantijb
基于Frida的iOS越狱检测绕过工具,可通过hook文件系统和ObjC函数来欺骗应用的越狱环境检测逻辑。
Stars: 19 | Forks: 5
# frida-antiantijb
基于 Frida 的几个简单的越狱检测绕过方法。目前还远未完善。
真正的 RASP 软件会对此一笑置之。
## 安装说明
```
npm install frida-objc-bridge
npm install
```
需要 `frida-objc-bridge` 来 hook 某些 ObjC 函数(参见 `agent/hooks/objc.ts`)。
## 使用方法
```
frida -Uf target -l main.js
```
## 示例输出
```
[*] access("/var/containers/Bundle/Application/OhNo/OhNo.app")
[*] snprintf("/private/var/mobile/Containers/Data/Application/OhNo/tmp/")
[*] symlink("/", "/private/var/mobile/Containers/Data/Application/OhNo/tmp/OhNo")
[*] snprintf("/private/var/mobile/Containers/Data/Application/OhNo/tmp/OhNo/usr/sbin/frida-server")
[!!!] Found suspicious string: /private/var/mobile/Containers/Data/Application/OhNo/tmp/OhNo/usr/sbin/frida-server
0x1039a2cd0 OhNo!0x34dacd0 (0x1034dacd0)
0x1039960b8 OhNo!0x34ce0b8 (0x1034ce0b8)
0x10396d460 OhNo!0x34a5460 (0x1034a5460)
0x10395f268 OhNo!0x3497268 (0x103497268)
0x10396d6d4 OhNo!0x34a56d4 (0x1034a56d4)
0x103a324dc OhNo!0x356a4dc (0x10356a4dc)
0x103a31c60 OhNo!0x3569c60 (0x103569c60)
0x103a35eec OhNo!+[OhNo load]
0x1984007cc libobjc.A.dylib!load_images
0x10506d9d4 dyld!dyld4::RuntimeState::notifyObjCInit(dyld4::Loader const*)
0x105071b54 dyld!dyld4::Loader::runInitializersBottomUp(dyld4::RuntimeState&, dyld3::Array&) const
0x105077840 dyld!dyld4::Loader::runInitializersBottomUpPlusUpwardLinks(dyld4::RuntimeState&) const
0x10509494c dyld!dyld4::APIs::runAllInitializersForMain()
0x105081c5c dyld!dyld4::prepare(dyld4::APIs&, dyld3::MachOAnalyzer const*)
0x1050804b0 dyld!start
[!!!] Replaced "/private/var/mobile/Containers/Data/Application/OhNo/tmp/OhNo/usr/sbin/frida-server"
```
## 待办事项
- 更健壮的系统调用处理
- 实现较少已知/私有的检测方法
- 添加更多检测字符串
- 改进 dyld 检测
- 尝试检测即将到来的故意崩溃
标签:Docker支持, dyld检测, Frida, frida-objc-bridge, Hook工具, iOS安全, MITM代理, ObjC运行时, RASP, 云资产清单, 代码生成, 动态 instrumentation, 数据可视化, 检测规避, 渗透测试工具, 目录枚举, 移动安全, 自动化攻击, 越狱检测绕过, 逆向工程