Skip to content
This repository has been archived by the owner on Oct 24, 2023. It is now read-only.

Commit

Permalink
update readme and release v1.3.0
Browse files Browse the repository at this point in the history
  • Loading branch information
SeeFlowerX committed Dec 5, 2022
1 parent d20da01 commit 7e337be
Show file tree
Hide file tree
Showing 2 changed files with 15 additions and 1 deletion.
16 changes: 15 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,14 +30,18 @@ adb push estrace /data/local/tmp
adb shell chmod +x /data/local/tmp/estrace
```

进入`adb shell``在root用户下`执行命令,示例如下:
进入`adb shell``在root用户下`执行命令,案例如下:

1. 追踪定位execve调用

```bash
/data/local/tmp/estrace --name com.starbucks.cn --syscall execve --getlr -o trace.log
```

![](./images/Snipaste_2022-11-22_17-10-18.png)

2. 尝试过root检查

项目提供了一个`--bypass`选项,你可以使用该选项测试过掉root检查,当然这里只是进行简单演示

对应eBPF程序的关键代码请查看[raw_syscalls.c](src/raw_syscalls.c)`send_data`函数
Expand All @@ -54,6 +58,16 @@ adb shell chmod +x /data/local/tmp/estrace

我这里magisk被安装到了`/dev/.magisk`,所以可能并不适用于其他情况,仅供参考,有兴趣请自行修改源码测试

3. 定位文件重定向检查

```bash
./estrace --name com.ysh.hookapkverify --syscall openat,readlinkat --getpc -o tmp.log
```

这是一个典型的内联svc检查文件是否被重定向的操作,借助`estrace`可实现快速定位

![](./images/Snipaste_2022-12-05_10-25-14.png)

更多命令,请执行`./estrace --help`查看

# 编译
Expand Down
Binary file added images/Snipaste_2022-12-05_10-25-14.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 7e337be

Please sign in to comment.