Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- /* Android ssl certificate pinning bypass script for various methods
- by Maurizio Siddu
- Run with:
- frida -U -f <APP_ID> -l frida_multiple_unpinning.js [--no-pause]
- YouTube VIDEO TUTORIAL / ВИДЕО-РУКОВОДСТВО НА YouTube: https://youtu.be/HCKXLWbrF8k
- */
- setTimeout(function() {
- Java.perform(function() {
- console.log('');
- console.log('======');
- console.log('[#] Android Bypass for various Certificate Pinning methods [#]');
- console.log('======');
- var errDict = {};
- // TrustManager (Android < 7) //
- ////////////////////////////////
- var X509TrustManager = Java.use('javax.net.ssl.X509TrustManager');
- var SSLContext = Java.use('javax.net.ssl.SSLContext');
- var TrustManager = Java.registerClass({
- // Implement a custom TrustManager
- name: 'dev.asd.test.TrustManager',
- implements: [X509TrustManager],
- methods: {
- checkClientTrusted: function(chain, authType) {},
- checkServerTrusted: function(chain, authType) {},
- getAcceptedIssuers: function() {return []; }
- }
- });
- // Prepare the TrustManager array to pass to SSLContext.init()
- var TrustManagers = [TrustManager.$new()];
- // Get a handle on the init() on the SSLContext class
- var SSLContext_init = SSLContext.init.overload(
- '[Ljavax.net.ssl.KeyManager;', '[Ljavax.net.ssl.TrustManager;', 'java.security.SecureRandom');
- try {
- // Override the init method, specifying the custom TrustManager
- SSLContext_init.implementation = function(keyManager, trustManager, secureRandom) {
- console.log('[+] Bypassing Trustmanager (Android < 7) pinner');
- SSLContext_init.call(this, keyManager, TrustManagers, secureRandom);
- };
- } catch (err) {
- console.log('[-] TrustManager (Android < 7) pinner not found');
- //console.log(err);
- }
- // OkHTTPv3 (quadruple bypass) //
- /////////////////////////////////
- try {
- // Bypass OkHTTPv3 {1}
- var okhttp3_Activity_1 = Java.use('okhttp3.CertificatePinner');
- okhttp3_Activity_1.check.overload('java.lang.String', 'java.util.List').implementation = function(a, b) {
- console.log('[+] Bypassing OkHTTPv3 {1}: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] OkHTTPv3 {1} pinner not found');
- //console.log(err);
- errDict[err] = ['okhttp3.CertificatePinner', 'check'];
- }
- try {
- // Bypass OkHTTPv3 {2}
- // This method of CertificatePinner.check is deprecated but could be found in some old Android apps
- var okhttp3_Activity_2 = Java.use('okhttp3.CertificatePinner');
- okhttp3_Activity_2.check.overload('java.lang.String', 'java.security.cert.Certificate').implementation = function(a, b) {
- console.log('[+] Bypassing OkHTTPv3 {2}: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] OkHTTPv3 {2} pinner not found');
- //console.log(err);
- //errDict[err] = ['okhttp3.CertificatePinner', 'check'];
- }
- try {
- // Bypass OkHTTPv3 {3}
- var okhttp3_Activity_3 = Java.use('okhttp3.CertificatePinner');
- okhttp3_Activity_3.check.overload('java.lang.String', '[Ljava.security.cert.Certificate;').implementation = function(a, b) {
- console.log('[+] Bypassing OkHTTPv3 {3}: ' + a);
- return;
- };
- } catch(err) {
- console.log('[-] OkHTTPv3 {3} pinner not found');
- //console.log(err);
- errDict[err] = ['okhttp3.CertificatePinner', 'check'];
- }
- try {
- // Bypass OkHTTPv3 {4}
- var okhttp3_Activity_4 = Java.use('okhttp3.CertificatePinner');
- //okhttp3_Activity_4['check$okhttp'].implementation = function(a, b) {
- okhttp3_Activity_4.check$okhttp.overload('java.lang.String', 'kotlin.jvm.functions.Function0').implementation = function(a, b) {
- console.log('[+] Bypassing OkHTTPv3 {4}: ' + a);
- return;
- };
- } catch(err) {
- console.log('[-] OkHTTPv3 {4} pinner not found');
- //console.log(err);
- errDict[err] = ['okhttp3.CertificatePinner', 'check$okhttp'];
- }
- // Trustkit (triple bypass) //
- //////////////////////////////
- try {
- // Bypass Trustkit {1}
- var trustkit_Activity_1 = Java.use('com.datatheorem.android.trustkit.pinning.OkHostnameVerifier');
- trustkit_Activity_1.verify.overload('java.lang.String', 'javax.net.ssl.SSLSession').implementation = function(a, b) {
- console.log('[+] Bypassing Trustkit {1}: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Trustkit {1} pinner not found');
- //console.log(err);
- errDict[err] = ['com.datatheorem.android.trustkit.pinning.OkHostnameVerifier', 'verify'];
- }
- try {
- // Bypass Trustkit {2}
- var trustkit_Activity_2 = Java.use('com.datatheorem.android.trustkit.pinning.OkHostnameVerifier');
- trustkit_Activity_2.verify.overload('java.lang.String', 'java.security.cert.X509Certificate').implementation = function(a, b) {
- console.log('[+] Bypassing Trustkit {2}: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Trustkit {2} pinner not found');
- //console.log(err);
- errDict[err] = ['com.datatheorem.android.trustkit.pinning.OkHostnameVerifier', 'verify'];
- }
- try {
- // Bypass Trustkit {3}
- var trustkit_PinningTrustManager = Java.use('com.datatheorem.android.trustkit.pinning.PinningTrustManager');
- trustkit_PinningTrustManager.checkServerTrusted.overload('[Ljava.security.cert.X509Certificate;', 'java.lang.String').implementation = function(chain, authType) {
- console.log('[+] Bypassing Trustkit {3}');
- };
- } catch (err) {
- console.log('[-] Trustkit {3} pinner not found');
- //console.log(err);
- errDict[err] = ['com.datatheorem.android.trustkit.pinning.PinningTrustManager', 'checkServerTrusted'];
- }
- // TrustManagerImpl (Android > 7) //
- ////////////////////////////////////
- try {
- // Bypass TrustManagerImpl (Android > 7) {1}
- var array_list = Java.use("java.util.ArrayList");
- var TrustManagerImpl_Activity_1 = Java.use('com.android.org.conscrypt.TrustManagerImpl');
- TrustManagerImpl_Activity_1.checkTrustedRecursive.implementation = function(certs, ocspData, tlsSctData, host, clientAuth, untrustedChain, trustAnchorChain, used) {
- console.log('[+] Bypassing TrustManagerImpl (Android > 7) checkTrustedRecursive check for: '+ host);
- return array_list.$new();
- };
- } catch (err) {
- console.log('[-] TrustManagerImpl (Android > 7) checkTrustedRecursive check not found');
- //console.log(err);
- errDict[err] = ['com.android.org.conscrypt.TrustManagerImpl', 'checkTrustedRecursive'];
- }
- try {
- // Bypass TrustManagerImpl (Android > 7) {2} (probably no more necessary)
- var TrustManagerImpl_Activity_2 = Java.use('com.android.org.conscrypt.TrustManagerImpl');
- TrustManagerImpl_Activity_2.verifyChain.implementation = function(untrustedChain, trustAnchorChain, host, clientAuth, ocspData, tlsSctData) {
- console.log('[+] Bypassing TrustManagerImpl (Android > 7) verifyChain check for: ' + host);
- return untrustedChain;
- };
- } catch (err) {
- console.log('[-] TrustManagerImpl (Android > 7) verifyChain check not found');
- //console.log(err);
- errDict[err] = ['com.android.org.conscrypt.TrustManagerImpl', 'verifyChain'];
- }
- // Appcelerator Titanium PinningTrustManager //
- ///////////////////////////////////////////////
- try {
- var appcelerator_PinningTrustManager = Java.use('appcelerator.https.PinningTrustManager');
- appcelerator_PinningTrustManager.checkServerTrusted.implementation = function(chain, authType) {
- console.log('[+] Bypassing Appcelerator PinningTrustManager');
- return;
- };
- } catch (err) {
- console.log('[-] Appcelerator PinningTrustManager pinner not found');
- //console.log(err);
- errDict[err] = ['appcelerator.https.PinningTrustManager', 'checkServerTrusted'];
- }
- // Fabric PinningTrustManager //
- ////////////////////////////////
- try {
- var fabric_PinningTrustManager = Java.use('io.fabric.sdk.android.services.network.PinningTrustManager');
- fabric_PinningTrustManager.checkServerTrusted.implementation = function(chain, authType) {
- console.log('[+] Bypassing Fabric PinningTrustManager');
- return;
- };
- } catch (err) {
- console.log('[-] Fabric PinningTrustManager pinner not found');
- //console.log(err);
- errDict[err] = ['io.fabric.sdk.android.services.network.PinningTrustManager', 'checkServerTrusted'];
- }
- // OpenSSLSocketImpl Conscrypt (double bypass) //
- /////////////////////////////////////////////////
- try {
- var OpenSSLSocketImpl = Java.use('com.android.org.conscrypt.OpenSSLSocketImpl');
- OpenSSLSocketImpl.verifyCertificateChain.implementation = function(certRefs, JavaObject, authMethod) {
- console.log('[+] Bypassing OpenSSLSocketImpl Conscrypt {1}');
- };
- } catch (err) {
- console.log('[-] OpenSSLSocketImpl Conscrypt {1} pinner not found');
- //console.log(err);
- errDict[err] = ['com.android.org.conscrypt.OpenSSLSocketImpl', 'verifyCertificateChain'];
- }
- try {
- var OpenSSLSocketImpl = Java.use('com.android.org.conscrypt.OpenSSLSocketImpl');
- OpenSSLSocketImpl.verifyCertificateChain.implementation = function(certChain, authMethod) {
- console.log('[+] Bypassing OpenSSLSocketImpl Conscrypt {2}');
- };
- } catch (err) {
- console.log('[-] OpenSSLSocketImpl Conscrypt {2} pinner not found');
- //console.log(err);
- errDict[err] = ['com.android.org.conscrypt.OpenSSLSocketImpl', 'verifyCertificateChain'];
- }
- // OpenSSLEngineSocketImpl Conscrypt //
- ///////////////////////////////////////
- try {
- var OpenSSLEngineSocketImpl_Activity = Java.use('com.android.org.conscrypt.OpenSSLEngineSocketImpl');
- OpenSSLEngineSocketImpl_Activity.verifyCertificateChain.overload('[Ljava.lang.Long;', 'java.lang.String').implementation = function(a, b) {
- console.log('[+] Bypassing OpenSSLEngineSocketImpl Conscrypt: ' + b);
- };
- } catch (err) {
- console.log('[-] OpenSSLEngineSocketImpl Conscrypt pinner not found');
- //console.log(err);
- errDict[err] = ['com.android.org.conscrypt.OpenSSLEngineSocketImpl', 'verifyCertificateChain'];
- }
- // OpenSSLSocketImpl Apache Harmony //
- //////////////////////////////////////
- try {
- var OpenSSLSocketImpl_Harmony = Java.use('org.apache.harmony.xnet.provider.jsse.OpenSSLSocketImpl');
- OpenSSLSocketImpl_Harmony.verifyCertificateChain.implementation = function(asn1DerEncodedCertificateChain, authMethod) {
- console.log('[+] Bypassing OpenSSLSocketImpl Apache Harmony');
- };
- } catch (err) {
- console.log('[-] OpenSSLSocketImpl Apache Harmony pinner not found');
- //console.log(err);
- errDict[err] = ['org.apache.harmony.xnet.provider.jsse.OpenSSLSocketImpl', 'verifyCertificateChain'];
- }
- // PhoneGap sslCertificateChecker //
- ////////////////////////////////////
- try {
- var phonegap_Activity = Java.use('nl.xservices.plugins.sslCertificateChecker');
- phonegap_Activity.execute.overload('java.lang.String', 'org.json.JSONArray', 'org.apache.cordova.CallbackContext').implementation = function(a, b, c) {
- console.log('[+] Bypassing PhoneGap sslCertificateChecker: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] PhoneGap sslCertificateChecker pinner not found');
- //console.log(err);
- errDict[err] = ['nl.xservices.plugins.sslCertificateChecker', 'execute'];
- }
- // IBM MobileFirst pinTrustedCertificatePublicKey (double bypass) //
- ////////////////////////////////////////////////////////////////////
- try {
- // Bypass IBM MobileFirst {1}
- var WLClient_Activity_1 = Java.use('com.worklight.wlclient.api.WLClient');
- WLClient_Activity_1.getInstance().pinTrustedCertificatePublicKey.overload('java.lang.String').implementation = function(cert) {
- console.log('[+] Bypassing IBM MobileFirst pinTrustedCertificatePublicKey {1}: ' + cert);
- return;
- };
- } catch (err) {
- console.log('[-] IBM MobileFirst pinTrustedCertificatePublicKey {1} pinner not found');
- //console.log(err);
- errDict[err] = ['com.worklight.wlclient.api.WLClient', 'pinTrustedCertificatePublicKey'];
- }
- try {
- // Bypass IBM MobileFirst {2}
- var WLClient_Activity_2 = Java.use('com.worklight.wlclient.api.WLClient');
- WLClient_Activity_2.getInstance().pinTrustedCertificatePublicKey.overload('[Ljava.lang.String;').implementation = function(cert) {
- console.log('[+] Bypassing IBM MobileFirst pinTrustedCertificatePublicKey {2}: ' + cert);
- return;
- };
- } catch (err) {
- console.log('[-] IBM MobileFirst pinTrustedCertificatePublicKey {2} pinner not found');
- //console.log(err);
- errDict[err] = ['com.worklight.wlclient.api.WLClient', 'pinTrustedCertificatePublicKey'];
- }
- // IBM WorkLight (ancestor of MobileFirst) HostNameVerifierWithCertificatePinning (quadruple bypass) //
- ///////////////////////////////////////////////////////////////////////////////////////////////////////
- try {
- // Bypass IBM WorkLight {1}
- var worklight_Activity_1 = Java.use('com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning');
- worklight_Activity_1.verify.overload('java.lang.String', 'javax.net.ssl.SSLSocket').implementation = function(a, b) {
- console.log('[+] Bypassing IBM WorkLight HostNameVerifierWithCertificatePinning {1}: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] IBM WorkLight HostNameVerifierWithCertificatePinning {1} pinner not found');
- //console.log(err);
- errDict[err] = ['com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning', 'verify'];
- }
- try {
- // Bypass IBM WorkLight {2}
- var worklight_Activity_2 = Java.use('com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning');
- worklight_Activity_2.verify.overload('java.lang.String', 'java.security.cert.X509Certificate').implementation = function(a, b) {
- console.log('[+] Bypassing IBM WorkLight HostNameVerifierWithCertificatePinning {2}: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] IBM WorkLight HostNameVerifierWithCertificatePinning {2} pinner not found');
- //console.log(err);
- errDict[err] = ['com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning', 'verify'];
- }
- try {
- // Bypass IBM WorkLight {3}
- var worklight_Activity_3 = Java.use('com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning');
- worklight_Activity_3.verify.overload('java.lang.String', '[Ljava.lang.String;', '[Ljava.lang.String;').implementation = function(a, b) {
- console.log('[+] Bypassing IBM WorkLight HostNameVerifierWithCertificatePinning {3}: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] IBM WorkLight HostNameVerifierWithCertificatePinning {3} pinner not found');
- //console.log(err);
- errDict[err] = ['com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning', 'verify'];
- }
- try {
- // Bypass IBM WorkLight {4}
- var worklight_Activity_4 = Java.use('com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning');
- worklight_Activity_4.verify.overload('java.lang.String', 'javax.net.ssl.SSLSession').implementation = function(a, b) {
- console.log('[+] Bypassing IBM WorkLight HostNameVerifierWithCertificatePinning {4}: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] IBM WorkLight HostNameVerifierWithCertificatePinning {4} pinner not found');
- //console.log(err);
- errDict[err] = ['com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning', 'verify'];
- }
- // Conscrypt CertPinManager //
- //////////////////////////////
- try {
- var conscrypt_CertPinManager_Activity = Java.use('com.android.org.conscrypt.CertPinManager');
- conscrypt_CertPinManager_Activity.checkChainPinning.overload('java.lang.String', 'java.util.List').implementation = function(a, b) {
- console.log('[+] Bypassing Conscrypt CertPinManager: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] Conscrypt CertPinManager pinner not found');
- //console.log(err);
- errDict[err] = ['com.android.org.conscrypt.CertPinManager', 'checkChainPinning'];
- }
- // Conscrypt CertPinManager (Legacy) //
- ///////////////////////////////////////
- try {
- var legacy_conscrypt_CertPinManager_Activity = Java.use('com.android.org.conscrypt.CertPinManager');
- legacy_conscrypt_CertPinManager_Activity.isChainValid.overload('java.lang.String', 'java.util.List').implementation = function(a, b) {
- console.log('[+] Bypassing Conscrypt CertPinManager (Legacy): ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Conscrypt CertPinManager (Legacy) pinner not found');
- //console.log(err);
- errDict[err] = ['com.android.org.conscrypt.CertPinManager', 'isChainValid'];
- }
- // CWAC-Netsecurity (unofficial back-port pinner for Android<4.2) CertPinManager //
- ///////////////////////////////////////////////////////////////////////////////////
- try {
- var cwac_CertPinManager_Activity = Java.use('com.commonsware.cwac.netsecurity.conscrypt.CertPinManager');
- cwac_CertPinManager_Activity.isChainValid.overload('java.lang.String', 'java.util.List').implementation = function(a, b) {
- console.log('[+] Bypassing CWAC-Netsecurity CertPinManager: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] CWAC-Netsecurity CertPinManager pinner not found');
- //console.log(err);
- errDict[err] = ['com.commonsware.cwac.netsecurity.conscrypt.CertPinManager', 'isChainValid'];
- }
- // Worklight Androidgap WLCertificatePinningPlugin //
- /////////////////////////////////////////////////////
- try {
- var androidgap_WLCertificatePinningPlugin_Activity = Java.use('com.worklight.androidgap.plugin.WLCertificatePinningPlugin');
- androidgap_WLCertificatePinningPlugin_Activity.execute.overload('java.lang.String', 'org.json.JSONArray', 'org.apache.cordova.CallbackContext').implementation = function(a, b, c) {
- console.log('[+] Bypassing Worklight Androidgap WLCertificatePinningPlugin: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Worklight Androidgap WLCertificatePinningPlugin pinner not found');
- //console.log(err);
- errDict[err] = ['com.worklight.androidgap.plugin.WLCertificatePinningPlugin', 'execute'];
- }
- // Netty FingerprintTrustManagerFactory //
- //////////////////////////////////////////
- try {
- var netty_FingerprintTrustManagerFactory = Java.use('io.netty.handler.ssl.util.FingerprintTrustManagerFactory');
- //NOTE: sometimes this below implementation could be useful
- //var netty_FingerprintTrustManagerFactory = Java.use('org.jboss.netty.handler.ssl.util.FingerprintTrustManagerFactory');
- netty_FingerprintTrustManagerFactory.checkTrusted.implementation = function(type, chain) {
- console.log('[+] Bypassing Netty FingerprintTrustManagerFactory');
- };
- } catch (err) {
- console.log('[-] Netty FingerprintTrustManagerFactory pinner not found');
- //console.log(err);
- errDict[err] = ['io.netty.handler.ssl.util.FingerprintTrustManagerFactory', 'checkTrusted'];
- }
- // Squareup CertificatePinner [OkHTTP<v3] (double bypass) //
- ////////////////////////////////////////////////////////////
- try {
- // Bypass Squareup CertificatePinner {1}
- var Squareup_CertificatePinner_Activity_1 = Java.use('com.squareup.okhttp.CertificatePinner');
- Squareup_CertificatePinner_Activity_1.check.overload('java.lang.String', 'java.security.cert.Certificate').implementation = function(a, b) {
- console.log('[+] Bypassing Squareup CertificatePinner {1}: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] Squareup CertificatePinner {1} pinner not found');
- //console.log(err);
- errDict[err] = ['com.squareup.okhttp.CertificatePinner', 'check'];
- }
- try {
- // Bypass Squareup CertificatePinner {2}
- var Squareup_CertificatePinner_Activity_2 = Java.use('com.squareup.okhttp.CertificatePinner');
- Squareup_CertificatePinner_Activity_2.check.overload('java.lang.String', 'java.util.List').implementation = function(a, b) {
- console.log('[+] Bypassing Squareup CertificatePinner {2}: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] Squareup CertificatePinner {2} pinner not found');
- //console.log(err);
- errDict[err] = ['com.squareup.okhttp.CertificatePinner', 'check'];
- }
- // Squareup OkHostnameVerifier [OkHTTP v3] (double bypass) //
- /////////////////////////////////////////////////////////////
- try {
- // Bypass Squareup OkHostnameVerifier {1}
- var Squareup_OkHostnameVerifier_Activity_1 = Java.use('com.squareup.okhttp.internal.tls.OkHostnameVerifier');
- Squareup_OkHostnameVerifier_Activity_1.verify.overload('java.lang.String', 'java.security.cert.X509Certificate').implementation = function(a, b) {
- console.log('[+] Bypassing Squareup OkHostnameVerifier {1}: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Squareup OkHostnameVerifier check not found');
- //console.log(err);
- errDict[err] = ['com.squareup.okhttp.internal.tls.OkHostnameVerifier', 'verify'];
- }
- try {
- // Bypass Squareup OkHostnameVerifier {2}
- var Squareup_OkHostnameVerifier_Activity_2 = Java.use('com.squareup.okhttp.internal.tls.OkHostnameVerifier');
- Squareup_OkHostnameVerifier_Activity_2.verify.overload('java.lang.String', 'javax.net.ssl.SSLSession').implementation = function(a, b) {
- console.log('[+] Bypassing Squareup OkHostnameVerifier {2}: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Squareup OkHostnameVerifier check not found');
- //console.log(err);
- errDict[err] = ['com.squareup.okhttp.internal.tls.OkHostnameVerifier', 'verify'];
- }
- // Android WebViewClient (quadruple bypass) //
- //////////////////////////////////////////////
- try {
- // Bypass WebViewClient {1} (deprecated from Android 6)
- var AndroidWebViewClient_Activity_1 = Java.use('android.webkit.WebViewClient');
- AndroidWebViewClient_Activity_1.onReceivedSslError.overload('android.webkit.WebView', 'android.webkit.SslErrorHandler', 'android.net.http.SslError').implementation = function(obj1, obj2, obj3) {
- console.log('[+] Bypassing Android WebViewClient check {1}');
- };
- } catch (err) {
- console.log('[-] Android WebViewClient {1} check not found');
- //console.log(err)
- errDict[err] = ['android.webkit.WebViewClient', 'onReceivedSslError'];
- }
- // Not working properly temporarily disused
- //try {
- // // Bypass WebViewClient {2}
- // var AndroidWebViewClient_Activity_2 = Java.use('android.webkit.WebViewClient');
- // AndroidWebViewClient_Activity_2.onReceivedHttpError.overload('android.webkit.WebView', 'android.webkit.WebResourceRequest', 'android.webkit.WebResourceResponse').implementation = function(obj1, obj2, obj3) {
- // console.log('[+] Bypassing Android WebViewClient check {2}');
- // };
- //} catch (err) {
- // console.log('[-] Android WebViewClient {2} check not found');
- // //console.log(err)
- // errDict[err] = ['android.webkit.WebViewClient', 'onReceivedHttpError'];
- //}
- try {
- // Bypass WebViewClient {3}
- var AndroidWebViewClient_Activity_3 = Java.use('android.webkit.WebViewClient');
- //AndroidWebViewClient_Activity_3.onReceivedError.overload('android.webkit.WebView', 'int', 'java.lang.String', 'java.lang.String').implementation = function(obj1, obj2, obj3, obj4) {
- AndroidWebViewClient_Activity_3.onReceivedError.implementation = function(view, errCode, description, failingUrl) {
- console.log('[+] Bypassing Android WebViewClient check {3}');
- };
- } catch (err) {
- console.log('[-] Android WebViewClient {3} check not found');
- //console.log(err)
- errDict[err] = ['android.webkit.WebViewClient', 'onReceivedError'];
- }
- try {
- // Bypass WebViewClient {4}
- var AndroidWebViewClient_Activity_4 = Java.use('android.webkit.WebViewClient');
- AndroidWebViewClient_Activity_4.onReceivedError.overload('android.webkit.WebView', 'android.webkit.WebResourceRequest', 'android.webkit.WebResourceError').implementation = function(obj1, obj2, obj3) {
- console.log('[+] Bypassing Android WebViewClient check {4}');
- };
- } catch (err) {
- console.log('[-] Android WebViewClient {4} check not found');
- //console.log(err)
- errDict[err] = ['android.webkit.WebViewClient', 'onReceivedError'];
- }
- // Apache Cordova WebViewClient //
- //////////////////////////////////
- try {
- var CordovaWebViewClient_Activity = Java.use('org.apache.cordova.CordovaWebViewClient');
- CordovaWebViewClient_Activity.onReceivedSslError.overload('android.webkit.WebView', 'android.webkit.SslErrorHandler', 'android.net.http.SslError').implementation = function(obj1, obj2, obj3) {
- console.log('[+] Bypassing Apache Cordova WebViewClient check');
- obj3.proceed();
- };
- } catch (err) {
- console.log('[-] Apache Cordova WebViewClient check not found');
- //console.log(err);
- }
- // Boye AbstractVerifier //
- ///////////////////////////
- try {
- var boye_AbstractVerifier = Java.use('ch.boye.httpclientandroidlib.conn.ssl.AbstractVerifier');
- boye_AbstractVerifier.verify.implementation = function(host, ssl) {
- console.log('[+] Bypassing Boye AbstractVerifier check for: ' + host);
- };
- } catch (err) {
- console.log('[-] Boye AbstractVerifier check not found');
- //console.log(err);
- errDict[err] = ['ch.boye.httpclientandroidlib.conn.ssl.AbstractVerifier', 'verify'];
- }
- // Apache AbstractVerifier (quadruple bypass) //
- ////////////////////////////////////////////////
- try {
- var apache_AbstractVerifier_1 = Java.use('org.apache.http.conn.ssl.AbstractVerifier');
- apache_AbstractVerifier_1.verify.overload('java.lang.String', 'java.security.cert.X509Certificate').implementation = function(a, b) {
- console.log('[+] Bypassing Apache AbstractVerifier {1} check for: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] Apache AbstractVerifier {1} check not found');
- //console.log(err);
- errDict[err] = ['org.apache.http.conn.ssl.AbstractVerifier', 'verify'];
- }
- try {
- var apache_AbstractVerifier_2 = Java.use('org.apache.http.conn.ssl.AbstractVerifier');
- apache_AbstractVerifier_2.verify.overload('java.lang.String', 'javax.net.ssl.SSLSocket').implementation = function(a, b) {
- console.log('[+] Bypassing Apache AbstractVerifier {2} check for: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] Apache AbstractVerifier {2} check not found');
- //console.log(err);
- errDict[err] = ['org.apache.http.conn.ssl.AbstractVerifier', 'verify'];
- }
- try {
- var apache_AbstractVerifier_3 = Java.use('org.apache.http.conn.ssl.AbstractVerifier');
- apache_AbstractVerifier_3.verify.overload('java.lang.String', 'javax.net.ssl.SSLSession').implementation = function(a, b) {
- console.log('[+] Bypassing Apache AbstractVerifier {3} check for: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] Apache AbstractVerifier {3} check not found');
- //console.log(err);
- errDict[err] = ['org.apache.http.conn.ssl.AbstractVerifier', 'verify'];
- }
- try {
- var apache_AbstractVerifier_4 = Java.use('org.apache.http.conn.ssl.AbstractVerifier');
- apache_AbstractVerifier_4.verify.overload('java.lang.String', '[Ljava.lang.String;', '[Ljava.lang.String;', 'boolean').implementation = function(a, b, c, d) {
- console.log('[+] Bypassing Apache AbstractVerifier {4} check for: ' + a);
- return;
- };
- } catch (err) {
- console.log('[-] Apache AbstractVerifier {4} check not found');
- //console.log(err);
- errDict[err] = ['org.apache.http.conn.ssl.AbstractVerifier', 'verify'];
- }
- // Chromium Cronet //
- /////////////////////
- try {
- var CronetEngineBuilderImpl_Activity = Java.use("org.chromium.net.impl.CronetEngineBuilderImpl");
- // Setting argument to TRUE (default is TRUE) to disable Public Key pinning for local trust anchors
- CronetEngine_Activity.enablePublicKeyPinningBypassForLocalTrustAnchors.overload('boolean').implementation = function(a) {
- console.log("[+] Disabling Public Key pinning for local trust anchors in Chromium Cronet");
- var cronet_obj_1 = CronetEngine_Activity.enablePublicKeyPinningBypassForLocalTrustAnchors.call(this, true);
- return cronet_obj_1;
- };
- // Bypassing Chromium Cronet pinner
- CronetEngine_Activity.addPublicKeyPins.overload('java.lang.String', 'java.util.Set', 'boolean', 'java.util.Date').implementation = function(hostName, pinsSha256, includeSubdomains, expirationDate) {
- console.log("[+] Bypassing Chromium Cronet pinner: " + hostName);
- var cronet_obj_2 = CronetEngine_Activity.addPublicKeyPins.call(this, hostName, pinsSha256, includeSubdomains, expirationDate);
- return cronet_obj_2;
- };
- } catch (err) {
- console.log('[-] Chromium Cronet pinner not found')
- //console.log(err);
- }
- // Flutter Pinning packages http_certificate_pinning and ssl_pinning_plugin (double bypass) //
- //////////////////////////////////////////////////////////////////////////////////////////////
- try {
- // Bypass HttpCertificatePinning.check {1}
- var HttpCertificatePinning_Activity = Java.use('diefferson.http_certificate_pinning.HttpCertificatePinning');
- HttpCertificatePinning_Activity.checkConnexion.overload("java.lang.String", "java.util.List", "java.util.Map", "int", "java.lang.String").implementation = function (a, b, c ,d, e) {
- console.log('[+] Bypassing Flutter HttpCertificatePinning : ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Flutter HttpCertificatePinning pinner not found');
- //console.log(err);
- errDict[err] = ['diefferson.http_certificate_pinning.HttpCertificatePinning', 'checkConnexion'];
- }
- try {
- // Bypass SslPinningPlugin.check {2}
- var SslPinningPlugin_Activity = Java.use('com.macif.plugin.sslpinningplugin.SslPinningPlugin');
- SslPinningPlugin_Activity.checkConnexion.overload("java.lang.String", "java.util.List", "java.util.Map", "int", "java.lang.String").implementation = function (a, b, c ,d, e) {
- console.log('[+] Bypassing Flutter SslPinningPlugin: ' + a);
- return true;
- };
- } catch (err) {
- console.log('[-] Flutter SslPinningPlugin pinner not found');
- //console.log(err);
- errDict[err] = ['com.macif.plugin.sslpinningplugin.SslPinningPlugin', 'checkConnexion'];
- }
- // Unusual/obfuscated pinners bypass //
- ///////////////////////////////////////
- try {
- // Iterating all caught pinner errors and try to overload them
- for (var key in errDict) {
- var errStr = key;
- var targetClass = errDict[key][0]
- var targetFunc = errDict[key][1]
- var retType = Java.use(targetClass)[targetFunc].returnType.type;
- //console.log("errDict content: "+errStr+" "+targetClass+"."+targetFunc);
- if (String(errStr).includes('.overload')) {
- overloader(errStr, targetClass, targetFunc,retType);
- }
- }
- } catch (err) {
- //console.log('[-] The pinner "'+targetClass+'.'+targetFunc+'" is not unusual/obfuscated, skipping it..');
- //console.log(err);
- }
- // Dynamic SSLPeerUnverifiedException Bypasser //
- // An useful technique to bypass SSLPeerUnverifiedException failures raising //
- // when the Android app uses some uncommon SSL Pinning methods or an heavily //
- // code obfuscation. Inspired by an idea of: https://github.com/httptoolkit //
- ///////////////////////////////////////////////////////////////////////////////
- try {
- var UnverifiedCertError = Java.use('javax.net.ssl.SSLPeerUnverifiedException');
- UnverifiedCertError.$init.implementation = function (reason) {
- try {
- var stackTrace = Java.use('java.lang.Thread').currentThread().getStackTrace();
- var exceptionStackIndex = stackTrace.findIndex(stack =>
- stack.getClassName() === "javax.net.ssl.SSLPeerUnverifiedException"
- );
- // Retrieve the method raising the SSLPeerUnverifiedException
- var callingFunctionStack = stackTrace[exceptionStackIndex + 1];
- var className = callingFunctionStack.getClassName();
- var methodName = callingFunctionStack.getMethodName();
- var callingClass = Java.use(className);
- var callingMethod = callingClass[methodName];
- console.log('\x1b[36m[!] Unexpected SSLPeerUnverifiedException occurred related to the method "'+className+'.'+methodName+'"\x1b[0m');
- //console.log("Stacktrace details:\n"+stackTrace);
- // Checking if the SSLPeerUnverifiedException was generated by an usually negligible (not blocking) method
- if (className == 'com.android.org.conscrypt.ActiveSession' || className == 'com.google.android.gms.org.conscrypt.ActiveSession') {
- throw 'Reason: skipped SSLPeerUnverifiedException bypass since the exception was raised from a (usually) non blocking method on the Android app';
- }
- else {
- console.log('\x1b[34m[!] Starting to dynamically circumvent the SSLPeerUnverifiedException for the method "'+className+'.'+methodName+'"...\x1b[0m');
- var retTypeName = callingMethod.returnType.type;
- // Skip it when the calling method was already bypassed with Frida
- if (!(callingMethod.implementation)) {
- // Trying to bypass (via implementation) the SSLPeerUnverifiedException if due to an uncommon SSL Pinning method
- callingMethod.implementation = function() {
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+className+'.'+methodName+'" via Frida function implementation\x1b[0m');
- returner(retTypeName);
- }
- }
- }
- } catch (err2) {
- // Dynamic circumvention via function implementation does not works, then trying via function overloading
- if (String(err2).includes('.overload')) {
- overloader(err2, className, methodName, retTypeName);
- } else {
- if (String(err2).includes('SSLPeerUnverifiedException')) {
- console.log('\x1b[36m[-] Failed to dynamically circumvent SSLPeerUnverifiedException -> '+err2+'\x1b[0m');
- } else {
- //console.log('\x1b[36m[-] Another kind of exception raised during overloading -> '+err2+'\x1b[0m');
- }
- }
- }
- //console.log('\x1b[36m[+] SSLPeerUnverifiedException hooked\x1b[0m');
- return this.$init(reason);
- };
- } catch (err1) {
- //console.log('\x1b[36m[-] SSLPeerUnverifiedException not found\x1b[0m');
- //console.log('\x1b[36m'+err1+'\x1b[0m');
- }
- });
- }, 0);
- function returner(typeName) {
- // This is a improvable rudimentary fix, if not works you can patch it manually
- //console.log("typeName: "+typeName)
- if (typeName === undefined || typeName === 'void') {
- return;
- } else if (typeName === 'boolean') {
- return true;
- } else {
- return null;
- }
- }
- function overloader(errStr, targetClass, targetFunc, retType) {
- // One ring to overload them all.. ;-)
- var tClass = Java.use(targetClass);
- var tFunc = tClass[targetFunc];
- var params = [];
- var argList = [];
- var overloads = tFunc.overloads;
- var returnTypeName = retType;
- var splittedList = String(errStr).split('.overload');
- for (var n=1; n<splittedList.length; n++) {
- var extractedOverload = splittedList[n].trim().split('(')[1].slice(0,-1).replaceAll("'","");
- // Discarding useless error strings
- if (extractedOverload.includes('<signature>')) {
- continue;
- }
- console.log('\x1b[34m[!] Found the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"\x1b[0m');
- // Check if extractedOverload is empty
- if (!extractedOverload) {
- // Overloading method withouth arguments
- tFunc.overload().implementation = function() {
- var printStr = printer();
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else {
- // Check if extractedOverload has multiple arguments
- if (extractedOverload.includes(',')) {
- argList = extractedOverload.split(', ');
- }
- // Considering max 8 arguments for the method to overload (Note: increase it, if needed)
- if (argList.length == 0) {
- tFunc.overload(extractedOverload).implementation = function(a) {
- var printStr = printer();
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else if (argList.length == 2) {
- tFunc.overload(argList[0], argList[1]).implementation = function(a,b) {
- var printStr = printer(a);
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else if (argList.length == 3) {
- tFunc.overload(argList[0], argList[1], argList[2]).implementation = function(a,b,c) {
- var printStr = printer(a,b);
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else if (argList.length == 4) {
- tFunc.overload(argList[0], argList[1], argList[2], argList[3]).implementation = function(a,b,c,d) {
- var printStr = printer(a,b,c);
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else if (argList.length == 5) {
- tFunc.overload(argList[0], argList[1], argList[2], argList[3], argList[4]).implementation = function(a,b,c,d,e) {
- var printStr = printer(a,b,c,d);
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else if (argList.length == 6) {
- tFunc.overload(argList[0], argList[1], argList[2], argList[3], argList[4], argList[5]).implementation = function(a,b,c,d,e,f) {
- var printStr = printer(a,b,c,d,e);
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else if (argList.length == 7) {
- tFunc.overload(argList[0], argList[1], argList[2], argList[3], argList[4], argList[5], argList[6]).implementation = function(a,b,c,d,e,f,g) {
- var printStr = printer(a,b,c,d,e,f);
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- } else if (argList.length == 8) {
- tFunc.overload(argList[0], argList[1], argList[2], argList[3], argList[4], argList[5], argList[6], argList[7]).implementation = function(a,b,c,d,e,f,g,h) {
- var printStr = printer(a,b,c,d,e,f,g);
- console.log('\x1b[34m[+] Bypassing the unusual/obfuscated pinner "'+targetClass+'.'+targetFunc+'('+extractedOverload+')"'+printStr+'\x1b[0m');
- returner(returnTypeName);
- }
- }
- }
- }
- }
- function printer(a,b,c,d,e,f,g,h) {
- // Build the string to print for the overloaded pinner
- var printList = [];
- var printStr = '';
- if (typeof a === 'string') {
- printList.push(a);
- }
- if (typeof b === 'string') {
- printList.push(b);
- }
- if (typeof c === 'string') {
- printList.push(c);
- }
- if (typeof d === 'string') {
- printList.push(d);
- }
- if (typeof e === 'string') {
- printList.push(e);
- }
- if (typeof f === 'string') {
- printList.push(f);
- }
- if (typeof g === 'string') {
- printList.push(g);
- }
- if (typeof h === 'string') {
- printList.push(h);
- }
- if (printList.length !== 0) {
- printStr = ' check for:';
- for (var i=0; i<printList.length; i++) {
- printStr += ' '+printList[i];
- }
- }
- return printStr;
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement