Frida is an Open Source and dynamic instrumentation toolkit, that allows developers, reverse-engineers, and security researchers to inject code into existing running processes.
Unlike other static tools used for reverse-engineering, it allows online patching operations, modifying the code of a program during its execution.
The possible areas of use are:
– reverse engineering
– live & “race-condition” debugging (custom scripts to modify live the behavior of the program by tracing the information I need)
– live and ephemeral patching (temporary program changes)
With Frida you can trace one or more specific functions and interact with the process by changing its behavior in a transparent way.
The toolkit provides a series of tools to facilitate interaction with the target application and the creation of scripts to be injected.
Cesare Pizzi, Security Analyst, showed step by step, during a technical session at Download Innovation, how to go and modify live an Android application with Frida.
Live-demo and references are available on floatingpoint.sorint.it.