Skip to content

Android's native SSL pinning bypass using Frida

Notifications You must be signed in to change notification settings

Aefyr/Eris-Frida

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Description

Eris-Frida removes certificates checks from android.security.net.config.NetworkSecurityTrustManager class, bypassing Android's native SSL pinning defined by network security config xml file.

Requirements:

  • Python 3.7 (Frida does not work on 3.6 for some reason) with frida-tools installed (pip install frida-tools)

  • Device running Android 7.0+ connected via USB with frida-server started (check docs). Your device must also be connected to a running adb server.

Usage:

Use eris.py <app package> to start app instance with SSL pinning bypassed

Example: eris.py com.example.app

Ctrl+C to kill the app process and exit eris.py

Notes

  • Originally I made Eris Xposed module, but there is no Xposed for Android 9 yet and Frida is supposed to support it, so I made these two little scripts. Still haven't tested them on Pie though.

  • Maybe it's just my ROM issue, but most of the times I have to first start eris.py just to get a process spawn timeout (but app does still launch without eris.js applied however) and then start eris.py again and it will restart the app and actually apply eris.js this time.

About

Android's native SSL pinning bypass using Frida

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published