Research

protection analysis of Tiktok’s .so layer
Last time I found two key .so files: sscronet and metasec_ml. I wanted to use jni trace to see the key information such as the loading sequence, parameters
2021-09-23

unidbg simulation execution
The static analysis of sscronet and metasec_ml can no longer work, so change your thinking and continue to look for it.
2021-10-03

how to simulate “like” action
The last article introduced the method to analysis the “likes” through method profiling
2021-09-04

reverse analysis of X-tone key encryption parameters algorithm
Last time I found the call stack of the malloc function in libc by printing the stack.
2021-09-15

Analysis of X-Gorgon Generations Algorithm
In previous article, we grab data packages of “like” action by using fiddler, and find four key pparameters need further analysis: X-Ladon, X-Gorgon, X-Tyhon, X-Argus.
2021-09-08

how to find key code under Android platform
Reverse engineering, whether in windows, Android, or macos, you have to face a problem: finding the key code in executable file.
2021-09-04