-
Notifications
You must be signed in to change notification settings - Fork 147
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Frida pass hookDetected and isJailBroken methods on Android #171
Comments
Hi @poPaTheGuru Did you find a fix? Thanks |
Hello @arpansharma7474 , we did not find a fix yet, but at this moment, the pen test team categorized this issue just as informational so we are waiting for any updates from the jail-monkey team |
Any updates in this topic? |
We also had our pentest team bypass using Frida, Did anybody find any solution, Thanks |
Hi Team, Do we have any progress here ? Many thanks |
Ended up going with https://github.com/darvincisec/DetectFrida |
Hi @sumi-svmx How did you implement this in React native? |
Copy the code from c directory from https://github.com/darvincisec/DetectFrida to your project. Add this to app build.gradle
Modify
Wherever ".. |
Thanks so much @sumi-svmx , but Where do I change the detectfrida function? I can see that function in native-lib.c, Should I change there? Could you share a sample repo of the integration if you don't mind? |
Can someone explain this . I am also facing the same |
Hi, I facing this issue. I tried to replace by Google Play Integrity API and it worked perfect. I think this's the best solution to check rooted device Android |
Please use below library to detect Frida and avoid frida to bypass root checks If you find this library helpful, please consider giving it a star ⭐ |
Hello!
We are working on a react native app that uses
"jail-monkey": "^2.7.0",
and at the initialisation of the app we check if the device is jail broken or in case there are any hooking methods attached to our app withJailMonkey.hookDetected() || JailMonkey.isJailBroken()
so we can throw a warning message to the user, but the problem is that just by doing that, a pentest team achieved to use the Android app without getting the warning message using Frida.My question: should we add something else beside that? Is there any known issue where Frida can penetrate these methods?
Thank you for your time!
The text was updated successfully, but these errors were encountered: