Frida
Description
A dynamic instrumentation toolkit used for mobile application penetration testing. Frida allows security researchers to inject scripts into running processes on Android and iOS devices, enabling runtime analysis, hooking of functions, and bypassing security controls.
Usage 1: Mobile Application Penetration Testing
Frida is used as a dynamic instrumentation framework for analyzing and testing mobile applications at runtime. It is referenced alongside Objection in the OWASP Mobile Security Testing Guide and HackTricks checklists for both Android and iOS pentesting.
Resources:
SecJuice Intro to Frida & Objection: https://www.secjuice.com/objection-frida-guide/
HackTricks Checklist (Android): https://book.hacktricks.xyz/mobile-apps-pentesting/android-checklist
HackTricks Checklist (iOS): https://book.hacktricks.xyz/mobile-apps-pentesting/ios-pentesting-checklist
OWASP Mobile Security Testing Guide: https://mobile-security.gitbook.io/mobile-security-testing-guide/overview/0x03-overview
Notes
- Frida is the underlying engine that powers Objection.
- It supports both Android and iOS platforms.
- Used for tasks such as SSL pinning bypass, function hooking, and runtime code modification.
- Refer to the OWASP Mobile Top 10 for common vulnerabilities that Frida can help identify: https://owasp.org/www-project-mobile-top-10/