What you'll learn:
- Listing process libraries
- Reversing Android apps
- Hooking Classes and Functions
- Examining and modifying function parameters and return values
- Reversing windows app
- Hooking process functions
- Memory scanning
- Process injection
- Hacking memory
- Decompiling apps
- Bypassing root detection
- Intercepting http and https traffic
- Bypassing basic security mechanism for android and windows apps
- Enumerating libraries and imported functions
- and more....
Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. It allows you to inject your own scripts into black box processes. Hook any function, spy on crypto APIs or trace private application code, no source code needed. Edit, hit save, and instantly see the results. All without compilation steps or program restarts. It’s the swiss army knife for process injections for native apps and is a popular dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript or your own library into native apps on Windows and Android. It is the go-to tool you use for API tracing.
At the end of this course you will be able to:
learn how to reverse engineer and perform process injection into android and windows applications
hook functions and modify its behaviour
perform basic bypass of security restrictions on android and windows apps
Features of this course:
Designed with beginners in mind.
Simple android apps and windows crackme's designed to learn process injection and function hooking
Practical and hands-on
Using free tools only
Suitable for:
Reverse Engineering and Malware Analysis Students
Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path
Security researchers
Prerequisite:
Windows PC
Basic Java/Javascript would be helpful but not mandatory
Preferably have an Android phone (non-rooted)
Enroll now and I will see you inside!