项目地址:https://github.com/BaiduSecurityLabs/ZjDroid
前提条件:
1、Root手机一部
2、需要通过Xposed installer( http://dl.xposed.info/latest.apk)安装Xposed Framework;
一、ZjDroid工具介绍
am broadcast -a com.zjdroid.invoke --ei target pid --es cmd '{"action":"dump_dexinfo"}'
使用说明
pid 调用时把pid换成目标进程的id
查看结果:
从Android的LogCat中查看结果,得到当前加载的dex的信息如:
The DexFile Infomation ->
07-27 02:29:52.728: D/zjdroid-shell-com.evernote(5365): filepath:/data/app/com.evernote-2.apk mCookie:1770063976
End DexFile Infomation
am broadcast -a com.zjdroid.invoke --ei target pid --es cmd '{"action":"dump_class","dexpath":"*****"}'
使用说明
pid 调用时把pid换成目标进程的id
dexpath 上一命令输出的dex文件地址,如/data/app/com.evernote-2.apk
查看结果:
从Android的LogCat中查看结果,得到当前加载的class信息
am broadcast -a com.zjdroid.invoke --ei target pid --es cmd '{"action":"backsmali","dexpath":"*****"}'
am broadcast -a com.zjdroid.invoke --ei target pid --es cmd '{"action":"dump_mem","startaddr":1234567,"length":123}'
使用说明
startaddr 注意此值是10进制
length 注意此值是10进制
adb shell logcat -s zjdroid-apimonitor-{package name}
转自:http://blog.csdn.net/androidsecurity/article/details/38121585
其他相关资料:
http://bbs.pediy.com/showthread.php?p=1303746
http://www.cnblogs.com/goodhacker/p/3961045.html?utm_source=tuicool
http://blog.csdn.net/androidsecurity/article/details/38121585
下载:
http://bbs.pediy.com/attachment.php?attachmentid=91176&d=1407035985
https://github.com/halfkiss/ZjDroid
zjdriod使用场景例子:
http://drops.wooyun.org/papers/3030
http://blog.csdn.net/ljb_iss/article/details/39083399
使用方法:
http://blog.csdn.net/guiguzi1110/article/details/38727753