You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
VAPT(Vulnerability Assessment and Penetration Testing) team able to do bypass the root detection/Jailbroken devices.
Using latest flutter_jailbreak_detection package
flutter_jailbreak_detection: ^1.8.0
Is it possible to detect Frida , Magisk DenyList and Liberty Lite tools using flutter_jailbreak_detection package?
Steps to Root Detection Bypass using Frida tool:
• Install Frida using command - pip install Frida
• Then using https://github.com/frida/frida/releases/ repo download Frida Server for our case it was ARM
• Then push Frida server to device using command - adb push frida-server /data/local/tmp/
• Take shell to device using command - adb shell and go to /data/local/tmp directory.
• Now run Frida server using command ./frida-server
• Now, if everything works and Frida server is on we can dump all running processes using command - frida-ps -U
• Then I bypassed root detection using command - frida --codeshare dzonerzy/fridantiroot -f com.xxxxx.xxxxxx -U
• Hence we were able to bypass root detection.
The text was updated successfully, but these errors were encountered:
Hi,
VAPT(Vulnerability Assessment and Penetration Testing) team able to do bypass the root detection/Jailbroken devices.
Using latest flutter_jailbreak_detection package
flutter_jailbreak_detection: ^1.8.0
Is it possible to detect Frida , Magisk DenyList and Liberty Lite tools using flutter_jailbreak_detection package?
Steps to Root Detection Bypass using Frida tool:
• Install Frida using command - pip install Frida
• Then using https://github.com/frida/frida/releases/ repo download Frida Server for our case it was ARM
• Then push Frida server to device using command - adb push frida-server /data/local/tmp/
• Take shell to device using command - adb shell and go to /data/local/tmp directory.
• Now run Frida server using command ./frida-server
• Now, if everything works and Frida server is on we can dump all running processes using command - frida-ps -U
• Then I bypassed root detection using command - frida --codeshare dzonerzy/fridantiroot -f com.xxxxx.xxxxxx -U
• Hence we were able to bypass root detection.
The text was updated successfully, but these errors were encountered: