Jump to content
Fi8sVrs

objection - runtime mobile exploration

Recommended Posts

  • Active Members
Posted (edited)

objection.png

objection

Runtime Mobile Exploration, powered by Frida.

 

introduction

objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device.

The project's name quite literally explains the approach as well, whereby runtime specific objects are injected into a running process and executed using Frida.

Note: This is not some form of jailbreak / root bypass. By using objection, you are still limited by all of the restrictions imposed by the applicable sandbox you are facing.

 

features

Supporting both iOS and Android and having new features and improvements added regularly as the tool is used in real world scenarios, the following is a short list of only a few key features:

For all supported platforms, objection allows you to:

  • Patch iOS and Android applications, embedding a Frida gadget that can be used with objection or just Frida itself.
  • Interact with the filesystem, listing entries as well as upload & download files where permitted.
  • Perform various memory related tasks, such as listing loaded modules and their respective exports.
  • Attempt to bypass and simulate jailbroken or rooted environments.
  • Discover loaded classes and list their respective methods.
  • Perform common SSL pinning bypasses.
  • Dynamically dump arguments from methods called as you use the target application.
  • Interact with SQLite databases inline without the need to download the targeted database and use an external tool.
  • Execute custom Frida scripts.

iOS specific features in objection include the ability to:

  • Dump the iOS keychain, and export it to a file.
  • Dump data from common storage such as NSUserDefaults and the shared NSHTTPCookieStorage.
  • Dump various formats of information in human readable forms.
  • Bypass certain forms of TouchID restrictions.
  • Watch for method executions by targeting all methods in a class, or just a single method.
  • Monitor the iOS pasteboard.
  • Dump encoded .plist files in a human readable format without relying on external parsers.

Android specific features in objection include the ability to:

  • List the applications Activities, Services and Broadcast receivers.
  • Start arbitrary Activities available in the target application.
  • Watch a class method, reporting execution as it happens.

 

screenshots

The following screenshots show the main objection repl, connected to a test application on both an iPad running iOS 10.2.1, and Samsung Galaxy S5 running Android 6.

 

A file system listing of the iOS applications main bundle

ios_ls.png

 

A file system listing of the Android applications bundle

android_ls.png

 

iOS Keychain dumped for the current application, and later written to a file called keychain.json

ios_keychain.png

 

Inline SQLite query tool

sqlite_example.png

 

SSL Pinning bypass running for an iOS application

ios_ssl_pinning_bypass.png

 

SSL Pinning bypass running for an Android application

android_ssl_pinning_bypass.png

 

sample usage

A sample session, where objection version 0.1 is used to explore the applications environment. Newer versions have the REPL prompt set to the current applications name, however usage has remained the same:

https://asciinema.org/a/8O6fjDHOdVKgPYeqITHXPp6HV

 

 

prerequisites

To run objection, all you need is the python3 interpreter to be available. Installation via pip should take care of all of the dependencies needed. For more details, please see the prerequisites section on the project wiki.

As for the target mobile applications though, for iOS, an unencrypted IPA is needed and Android just the normal APK should be fine. If you have the source code of the iOS application you want to explore, then you can simply embed and load the FridaGadget.dylib from within the Xcode project.

 

installation

Installation is simply a matter of pip3 install objection. This will give you the objection command.

For more detailed update and installation instructions, please refer to the wiki page here.

 

powered by

frida_logo.png

 

license

Objection is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License Permissions beyond the scope of this license may be available at http://sensepost.com/contact/

 

Download:  objection-master.zip

or

git clone https://github.com/sensepost/objection.git

Source: https://github.com/sensepost/objection

 

Edited by Fi8sVrs
  • Upvote 2

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...