Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

怎么通过异常 来定位原因并修改相应的调用来解决 #60

Open
jackjosnlv opened this issue Sep 27, 2019 · 3 comments
Open

Comments

@jackjosnlv
Copy link

com/taobao/wireless/security/adapter/common/SPUtility2->readFromSPUnified(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;)Ljava/lang/String;

在c里面有通过jni调用这个函数,把正确的返回值发我,应该就差不多了

Originally posted by @zhkl0228 in #20 (comment)

大神,这个是通过什么方式来定位到? unidbg中到log信息?还是其他方式呢?
也碰到一个抛了异常 class=com/alibaba/wireless/security/open/SecException的case
但是不知道怎么定位异常原因。求指教

@jackjosnlv jackjosnlv changed the title com/taobao/wireless/security/adapter/common/SPUtility2->readFromSPUnified(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;)Ljava/lang/String; 怎么通过异常 来定位原因并修改相应的调用来解决 Sep 27, 2019
@zhkl0228
Copy link
Owner

自己逆向分析得出的

@jackjosnlv
Copy link
Author

嗯,感谢大神回复,我在研究研究。

@jackjosnlv
Copy link
Author

大神,测试10401指令时触发了异常,困扰了好几天了,毫无头绪 求指教。
测试用例:包含hook的信息
测试代码用例.zip

apk下载地址:

错误log日志如下:
[11:45:49 746] DEBUG [cn.banny.unidbg.AbstractEmulator] (AbstractEmulator:269) - emulate unicorn@0x4000fe61[libmain.so]0xfe61 started sp=unicorn@0xbffff7e4
[11:45:49 746] INFO [cn.banny.unidbg.AbstractEmulator] (AbstractEmulator:270) - emulate unicorn@0x4000fe61[libmain.so]0xfe61 started sp=unicorn@0xbffff7e4
[11:45:49 756] DEBUG [cn.banny.unidbg.linux.android.dvm.DvmClass] (DvmClass:53) - getMethodID name=java/lang/Integer->intValue()I, hash=0x5d9f068b
[11:45:49 758] DEBUG [cn.banny.unidbg.linux.android.dvm.DvmClass] (DvmClass:53) - getMethodID name=java/lang/Boolean->booleanValue()Z, hash=0x31f67dab
[11:45:49 761] DEBUG [cn.banny.unidbg.linux.android.dvm.DvmClass] (DvmClass:53) - getMethodID name=com/alibaba/wireless/security/open/SecException->(Ljava/lang/String;I)V, hash=0x751ae70b
==出现异常了==msg StringObject{value=} ==value= 10505
[11:45:49 761] WARN [cn.banny.unidbg.linux.android.dvm.DalvikVM] (DalvikVM$2:65) - Throw object=unicorn@0x4fb61f4a, dvmObject=DvmObject{value=test[10505]}, class=com/alibaba/wireless/security/open/SecException
[11:45:49 761] DEBUG [cn.banny.unidbg.AbstractEmulator] (AbstractEmulator:298) - emulate unicorn@0x4000fe61[libmain.so]0xfe61 finished sp=unicorn@0xbffff7e4, offset=15ms

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants