安卓逆向 reoky android-crackme-challenge4 frida劫持安卓位置location
补环境gradle
然后手动给在雷电模拟器上给apk 位置信息权限 不然apk会崩溃
脚本
/**
* Challenge Four - Professional Manual Mode
* 适用于已手动授予位置权限的情况
*/
"use strict";
Java.perform(function () {
console.log("\n[+] --- Challenge Four Hook (Manual Permission Mode) ---");
const Location = Java.use("android.location.Location");
const TargetFragment = "com.reoky.crackme.challengefour.fragments.ChallengeFourFragment";
// 1. 劫持坐标数据 (数据层)
// 源码逻辑是 (int)Lat == 44 && (int)Lon == -93
Location.getLatitude.implementation = function () {
return 44.5;
};
Location.getLongitude.implementation = function () {
return -93.5;
};
console.log("[+] 脚本就绪。请在 APP 界面点击 'CHECK LOCATION' 按钮。");
});

浙公网安备 33010602011771号