东航app研究

 

东方航空_9.4.34.apk
  梆梆加固企业版   去壳反编译  并且 frida 

ScreenShot_2025-11-17_103021_024

app 有 root\frida hook 等检测


 [com.rytong.ceair] frida -U -f com.rytong.ceair -l find_anit_frida_so.js                                                                                        15:17:52
     ____
    / _  |   Frida 16.7.19 - A world-class dynamic instrumentation toolkit
   | (_| |
    > _  |   Commands:
   /_/ |_|       help      -> Displays the help system
   . . . .       object?   -> Display information about 'object'
   . . . .       exit/quit -> Exit
   . . . .
   . . . .   More info at https://frida.re/docs/home/
   . . . .
   . . . .   Connected to Redmi Note 8 (id=a0a5bca0)
Spawning `com.rytong.ceair`...
addr_android_dlopen_ext 0x7e96592fb8
Spawned `com.rytong.ceair`. Resuming main thread!
[Redmi Note 8::com.rytong.ceair ]-> android_dlopen_ext: /system/framework/oat/arm64/org.apache.http.legacy.boot.odex
leave!
android_dlopen_ext: /data/app/com.rytong.ceair-tSPhvphN2wMbYRbmGthTpQ==/oat/arm64/base.odex
leave!
android_dlopen_ext: /data/app/com.rytong.ceair-tSPhvphN2wMbYRbmGthTpQ==/lib/arm64/libDexHelper.so
leave!
Process crashed: Bad access due to invalid address

***
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.8.0.PCOCNXM:user/release-keys'
Revision: '0'
ABI: 'arm64'
pid: 12557, tid: 12582, name: om.rytong.ceair  >>> com.rytong.ceair <<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x88c
Cause: null pointer dereference
    x0  0000000000000000  x1  00000000b6a2888e  x2  0000000000000fff  x3  0000000000000064
    x4  0000000000000072  x5  8080800000000000  x6  656e696c6e692d2d  x7  646f632d78616d2d
    x8  00000000b6a2888e  x9  000000000000088c  x10 00000000b6a2888e  x11 000000000000100d
    x12 000000000000088c  x13 00303d7374696e75  x14 ffff000000000000  x15 ffffffffffffffff
    x16 0000007e94c1e128  x17 0000007e94b2da1c  x18 0000000000000010  x19 0000007df75ff10a
    x20 0000007df75ff588  x21 0000007df75ff0f0  x22 0000007df75ff1d0  x23 0000007df75ff2c0
    x24 0000007df75ff08a  x25 0000007df7502000  x26 0000007e9a0135e0  x27 0000000000000002
    x28 00000000000000be  x29 0000007df75ff030
    sp  0000000000000000  lr  0000000000000000  pc  000000000000088c

backtrace:
    #00 pc 000000000000088c  <unknown>
***
[Redmi Note 8::com.rytong.ceair ]->

Thank you for using Frida!
🦉 [com.rytong.ceair]  
 libDexHelper.so 是梆梆企业版 这个也要处理

 

特征    厂商
libchaosvmp.so    娜迦
libddog.so    娜迦
libfdog.so    娜迦
libedog.so    娜迦企业版
libexec.so    爱加密、腾讯
libexecmain.so    爱加密
ijiami.dat    爱加密
ijiami.ajm    爱加密企业版
libsecexe.so    梆梆免费版
libsecmain.so    梆梆免费版
libSecShell.so    梆梆免费版
libDexHelper.so    梆梆企业版
libDexHelper-x86.so    梆梆企业版
libprotectClass.so    360
libjiagu.so    360
libjiagu_art.so    360
libjiagu_x86.so    360
libegis.so    通付盾
libNSaferOnly.so    通付盾
libnqshield.so    网秦
libbaiduprotect.so    百度
aliprotect.dat    阿里聚安全
libsgmain.so    阿里聚安全
libsgsecuritybody.so    阿里聚安全
libmobisec.so    阿里聚安全
libtup.so    腾讯
libshell.so    腾讯
mix.dex    腾讯
mixz.dex    腾讯
libtosprotection.armeabi.so    腾讯御安全
libtosprotection.armeabi-v7a.so    腾讯御安全
libtosprotection.x86.so    腾讯御安全
libnesec.so    网易易盾
libAPKProtect.so    APKProtect
libkwscmm.so    几维安全
libkwscr.so    几维安全
libkwslinker.so    几维安全
libx3g.so    顶像科技
libapssec.so    盛大
librsprotect.so    瑞星

 

研究后发现   其实不需要 处理 apk

里面嵌的是 html

直接分析  html

发现使用的是阿里 waf   sdk 2.3.14d

计算出   refer__1036  和 ssxmod_itna  即可

  微信图片_20251128153732_5147_5

 

posted @ 2025-11-18 15:31  🐳.城南  阅读(0)  评论(0)    收藏  举报