Frida instrumentation

Frida trace and memory patch

Trace a specific MODULE!OFFSET

frida_venv-14.2.18\Scripts\frida-trace-script.py -U -f 'com.xxx.xxx.xxxx' -a 'Myxxx!0x100000'

If you are getting some troubles, why not using the passionfruit console to get the trace with the offsets. After that, analyze them in IDA or GHIDRA ;)

Or using the frida-trace utility to instrument the execution ... (change the .js file on __handlers__ folder).

After that, you can patch in memory your ipa from, 0x10016E790 to 0x10016E7AC.

Run it.

Jailbreak detector + bypass

In order to detect the function are doing jailbreak detection you can use this script available on frida code share repository.

After that, you can do the steps executed above: reversing it and patch it in memory. 😎

In addition, You can try to use this script to bypass jailbreak detection.

Last updated

Was this helpful?