-
-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Add MASTG-DEMO-0091: iOS Frida Detection Demo #3508
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
This demo demonstrates: - Dynamic library scanning for Frida detection - Port scanning (27042, 27043) - Thread count analysis - Frida bypass techniques using Interceptor API Related to MASTG-TEST-0091: Testing Reverse Engineering Tools Detection
|
As discussed on Slack this PR was supposed to address #3001. Please take a look at the ticket, port the test case and create all files according to our guidelines (documentation is linked in the ticket and you can also take existing tests/demos) as reference. Thank you! |
cpholguera
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A quick first round of feedback. Please fix this and I'll review the rest afterwards. Thanks a lot!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add the exact same metadata as in other deprecated tests.
| 1. Launch the app with @MASTG-TOOL-0031 attached using `frida -U -n <app-name>` or spawn mode. | ||
| 2. Exercise the app's functionality to trigger any detection mechanisms. | ||
| 3. Monitor the app's response to the presence of Frida. | ||
| 4. Use @MASTG-DEMO-0091 to test the detection and bypass capabilities. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tests never use demos. Demos have a metadata field to link them to tests.
|
|
||
| Note that these detection methods can be bypassed using Frida's Interceptor API to hook the detection functions and manipulate their return values. | ||
|
|
||
| ## Steps |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tests must not refer to TOOLs, use TECH instead. Please check other similar tests and try to align the steps as much as possible
|
|
||
| ## Overview | ||
|
|
||
| This test case verifies whether an iOS app can detect the presence of reverse engineering tools at runtime, specifically focusing on @MASTG-TOOL-0031 (Frida). Apps implementing resilience measures may include runtime checks to detect dynamic instrumentation frameworks and respond appropriately (e.g., alerting users, terminating execution, or reporting to backend servers). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tests must not refer to TOOLs.
This demo demonstrates:
Related to MASTG-TEST-0091: Testing Reverse Engineering Tools Detection
This PR closes #issue_number
Description
Provide a brief description of the changes introduced by this PR.
[x] I have read the contributing guidelines.
Guidelines for Pull Requests (you can delete this section after reading):