Research

protection analysis of Tiktok’s .so layer

protection analysis of Tiktok’s .so layer

Last time I found two key .so files: sscronet and metasec_ml. I wanted to use jni trace to see the key information such as the loading sequence, parameters

2021-09-23

Research

unidbg simulation execution

unidbg simulation execution

The static analysis of sscronet and metasec_ml can no longer work, so change your thinking and continue to look for it.

2021-10-03

Research

how to simulate “like” action

how to simulate “like” action

The last article introduced the method to analysis the “likes” through method profiling

2021-09-04

Research

reverse analysis of X-tone key encryption parameters algorithm

reverse analysis of X-tone key encryption parameters algorithm

Last time I found the call stack of the malloc function in libc by printing the stack.

2021-09-15

Research

Analysis of X-Gorgon Generations Algorithm

Analysis of X-Gorgon Generations Algorithm

In previous article, we grab data packages of “like” action by using fiddler, and find four key pparameters need further analysis: X-Ladon, X-Gorgon, X-Tyhon, X-Argus.

2021-09-08

Research

how to find key code under Android platform

how to find key code under Android platform

Reverse engineering, whether in windows, Android, or macos, you have to face a problem: finding the key code in executable file.

2021-09-04

Research