參考資訊:
https://github.com/frida/frida
https://frida.re/docs/functions/
https://frida.re/docs/installation/
main.c
#include <stdio.h>
#include <unistd.h>
static void test(unsigned char *buf)
{
buf[0] = 0x00;
buf[1] = 0x11;
buf[2] = 0x22;
buf[3] = 0x33;
}
int main(int argc, char *argv[])
{
unsigned char buf[4] = { 0 };
printf("test()=%p\n", test);
usleep(10000000);
test(buf);
return 0;
}
hook.py
import sys
import frida
def on_message(message, data):
print(message)
session = frida.attach("main")
script = session.create_script("""
Interceptor.attach(ptr("%s"), {
onEnter: function (args) {
this.saveArg = args[0];
},
onLeave: function (retval) {
var a = this.saveArg.readByteArray(4);
var b = new Uint8Array(a);
send("0x" + b[0].toString(16));
send("0x" + b[1].toString(16));
send("0x" + b[2].toString(16));
send("0x" + b[3].toString(16));
}
});
""" % int(sys.argv[1], 16))
script.on('message', on_message)
script.load()
sys.stdin.read()
編譯、執行
$ gcc main.c -o main
$ ./main&
test()=0x55cadeb1e149
$ python3 ./hook.py 0x55cadeb1e149
{'type': 'send', 'payload': '0x0'}
{'type': 'send', 'payload': '0x11'}
{'type': 'send', 'payload': '0x22'}
{'type': 'send', 'payload': '0x33'}