Completed
Modifying handlers
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Fun with Frida on Mobile - Leveraging Dynamic Analysis Tools
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Black-box testing challenges
- 3 Enter Frida
- 4 Where does it work?
- 5 Frida's toolkit
- 6 Simple example - frida-trace on iOS
- 7 Digging into a trace
- 8 Inside a handler
- 9 Modifying handlers
- 10 A new and improved trace
- 11 Where was that code running?
- 12 How can we use Frida?
- 13 Tracing functions on Android
- 14 Function tracing in action
- 15 Using a trace to explore
- 16 Exploring keychain functionality
- 17 What did we find?
- 18 Frida CLI
- 19 Exploring Keychain classes
- 20 Automating with agent scripts
- 21 Tracing Java methods on Android
- 22 Building agent.js
- 23 Java trace in action
- 24 How can we use agents?
- 25 Bluetooth metadata on Android
- 26 URL scheme fuzzing on iOS
- 27 Adding commands
- 28 URL scheme fuzzer highlights
- 29 Using Frida Codeshare
- 30 Bypassing controls - SSL pinning
- 31 SSL pinning bypass on iOS
- 32 Interceptor API
- 33 Locating nw tls create peer trust
- 34 Replacing nw_tls_create_peer_trust
- 35 Try it for yourself!
- 36 SSL pinning bypass - demo
- 37 Standalone tools
- 38 Elements of a standalone tool
- 39 Basic Python script
- 40 Frida rpc.exports
- 41 The agent: classdump.js
- 42 Want to learn more?