HOME > IT & Software > Reverse Engineering- Frida for Beginners

Reverse Engineering- Frida for Beginners

SynopsisReverse Engineering: Frida for Beginners, available at $64.99...
Reverse Engineering- Frida for Beginners  No.1

Reverse Engineering: Frida for Beginners, available at $64.99, has an average rating of 4.5, with 44 lectures, based on 94 reviews, and has 7077 subscribers.

You will learn about Listing process libraries Reversing Android apps Hooking Classes and Functions Examining and modifying function parameters and return values Reversing windows app Hooking process functions Memory scanning Process injection Hacking memory Decompiling apps Bypassing root detection Intercepting http and https traffic Bypassing basic security mechanism for android and windows apps Enumerating libraries and imported functions and more. This course is ideal for individuals who are Reverse engineering and malware analysis students or Security researchers or Penetration testers It is particularly useful for Reverse engineering and malware analysis students or Security researchers or Penetration testers.

Enroll now: Reverse Engineering: Frida for Beginners

Summary

Title: Reverse Engineering: Frida for Beginners

Price: $64.99

Average Rating: 4.5

Number of Lectures: 44

Number of Published Lectures: 44

Number of Curriculum Items: 44

Number of Published Curriculum Objects: 44

Original Price: $59.99

Quality Status: approved

Status: Live

What You Will Learn

  • Listing process libraries
  • Reversing Android apps
  • Hooking Classes and Functions
  • Examining and modifying function parameters and return values
  • Reversing windows app
  • Hooking process functions
  • Memory scanning
  • Process injection
  • Hacking memory
  • Decompiling apps
  • Bypassing root detection
  • Intercepting http and https traffic
  • Bypassing basic security mechanism for android and windows apps
  • Enumerating libraries and imported functions
  • and more.
  • Who Should Attend

  • Reverse engineering and malware analysis students
  • Security researchers
  • Penetration testers
  • Target Audiences

  • Reverse engineering and malware analysis students
  • Security researchers
  • Penetration testers
  • Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. It allows you to inject your own scripts into black box processes. Hook any function, spy on crypto APIs or trace private application code, no source code needed. Edit, hit save, and instantly see the results. All without compilation steps or program restarts. It’s the swiss army knife for process injections for native apps and is a popular dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript or your own library into native apps on Windows and Android.  It is the go-to tool you use for API tracing.

    At the end of this course you will be able to:

    1. learn how to reverse engineer and perform process injection into android and windows applications

    2. hook functions and modify its behaviour

    3. perform basic bypass of security restrictions on android and windows apps

    Features of this course:

    1. Designed with beginners in mind.

    2. Simple android apps and windows crackme’s designed to learn process injection and function hooking

    3. Practical and hands-on

    4. Using free tools only

    Suitable for:

  • Reverse Engineering and Malware Analysis Students

  • Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path

  • Security researchers

  • Prerequisite:

  • Windows PC

  • Basic Java/Javascript would be helpful but not mandatory

  • Preferably have an Android phone (non-rooted)

  • Enroll now and I will see you inside!

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Intro to Frida

    Lecture 2: Intro to Frida Injection

    Chapter 2: Setting up lab and rooted android emulator

    Lecture 1: Installing LD-player emulator

    Lecture 2: Installing platform tools

    Lecture 3: Installing frida-server on the android emulator

    Lecture 4: Installing objection and frida tools on the pc

    Lecture 5: Testing objection and frida

    Chapter 3: Setting up lab for non-rooted android phone

    Lecture 1: Installing Android-studio build-tools

    Lecture 2: Installing the apktool

    Lecture 3: Patching the target apk file with the frida-gadget (frida-server)

    Lecture 4: Enabling developer-mode on the android phone

    Lecture 5: Installing the patched-apk file to the android phone and testing it

    Chapter 4: Decompiling apk files

    Lecture 1: Reverse engineering using the apktool

    Lecture 2: Installing dex2jar and jd-gui

    Lecture 3: Decompiling an apk file using dex2jar and jd-gui

    Chapter 5: Understanding the Frida CLI

    Lecture 1: Understanding the Frida CLI

    Chapter 6: Simple Frida hello-world script

    Lecture 1: Simple Frida hello-world script

    Chapter 7: Frida script to list classes

    Lecture 1: Frida script to list classes

    Chapter 8: Frida scripts to list methods and properties

    Lecture 1: Frida scripts to list methods and properties

    Chapter 9: Hooking functions and bypassing root detection

    Lecture 1: Intro to hooking functions

    Lecture 2: Decompiling apk to identify target function to hook

    Lecture 3: Hooking functions and modifying them

    Chapter 10: Dumping function parameters

    Lecture 1: Dumping function parameters

    Chapter 11: Re-using app functions in Frida scripts and decrypting passwords

    Lecture 1: Analyzing app functions and creating skeleton script

    Lecture 2: Implementing app functions in frida and decrypting password

    Chapter 12: Frida and Windows: listing modules

    Lecture 1: Listing windows modules (DLL libraries) using Frida

    Chapter 13: Hooking windows MessageBox function

    Lecture 1: Hooking windows MessageBox function

    Chapter 14: Modifying the windows MessageBox API

    Lecture 1: Modifying the windows MessageBox API

    Chapter 15: Listing windows process functions

    Lecture 1: Listing windows process functions

    Chapter 16: Hooking file reading functions

    Lecture 1: Hooking file reading functions

    Chapter 17: Memory scanning and hacking

    Lecture 1: Memory scanning and hacking

    Chapter 18: Supplementary lessons – Android ethical hacking

    Lecture 1: Additional lessons on android ethical hacking

    Chapter 19: Intercepting http traffic

    Lecture 1: Installing Burpsuite

    Lecture 2: Setting Burpsuite proxy for LDplayer emulator

    Lecture 3: Installing the Insecure Banking app

    Chapter 20: Intercepting HTTPs traffic

    Lecture 1: Installing burpsuite CA cert

    Lecture 2: Modifying network-security-config

    Lecture 3: Creating keystore signing and intercepting https

    Chapter 21: Local data storage vulnerabilities

    Lecture 1: Local data storage vulnerabilities

    Chapter 22: Exported application component vulnerabilities

    Lecture 1: Exported application component vulnerabilities

    Chapter 23: Insecure logging vulnerability

    Lecture 1: Insecure logging vulnerability

    Chapter 24: Bypassing root detection using objection

    Lecture 1: Bypassing root detection using objection

    Lecture 2: Running Frida scripts after objection root bypass

    Chapter 25: Resources for further study

    Lecture 1: Bonus Lecture

    Instructors

  • Reverse Engineering- Frida for Beginners  No.2
    Paul Chin
    College lecturer
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 1 votes
  • 3 stars: 8 votes
  • 4 stars: 29 votes
  • 5 stars: 53 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!