reFlutter是一款功能强大的逆向工程分析工具,该工具主要针对的是Flutter应用程序。该框架使用了已编译且重新封装的Flutter库来帮助广大研究人员对Flutter应用程序进行逆向工程分析。
除此之外,reFlutter框架的代码还修改了快照反序列化进程,以方便研究人员对目标应用程序执行动态分析。
1、socket.cc可执行流量拦截和监控;
2、dart.cc支持输出类、函数和某些字段;
3、方便进行自定义修改或重编译;
4、支持使用专门的Dockerfile对项目代码进行手动修改;
Android:ARM64、ARM32;
iOS:ARM64;
发布版本:稳定版(Stable)、测试版(Beta);
适用于Linux、Windows和macOS:
pip3 install reflutter
impact@f:~$ reflutter main.apk ? Please enter your Burp Suite IP: input_ip> ? SnapshotHash: 8ee4ef7a67df9845fba331734198a953 The resulting apk file: ./release.RE.apk Please sign the apk file ? Configure Burp Suite proxy server to listen on *:8083 Proxy Tab -> Options -> Proxy Listeners -> Edit -> Binding Tab ? Then enable invisible proxying in Request Handling Tab Support Invisible Proxying -> true ? impact@f:~$ reflutter main.ipa
我们需要制定Burp?Suite代理服务器的IP地址,且需要跟运行了目标Flutter应用程序的设备处于同一网络总。接下来,我们还需要配置代理(BurpSuite -> Listener Proxy -> Options tab):
1、添加端口:8083;
2、绑定地址:所有接口;
3、请求处理:支持隐形代理?= True
我们不需要安装任何的证书,在Android设备上我们也不需要root权限。除此之外,reFlutter还允许我们绕过某些Flutter证书绑定实现。
生成的apk必须对齐并签名,这里我们可以使用uber-apk-signer和下列命令:
java -jar uber-apk-signer.jar --allowResign -a release.RE.apk
如果你想使用DartVM来查看哪些代码被加载了,你还需要在设备上运行应用程序,reFlutter会通过logcat和“reflutter”选项来输出结果:
impact@f:~$ adb logcat -e reflutter | sed 's/.*DartVM//' >> reflutter.txt
代码输出结果如下:
Library:'package:anyapp/navigation/DeepLinkImpl.dart' Class: Navigation extends Object { ? ? String* DeepUrl = anyapp://evil.com/ ; ? ?Function 'Navigation.': constructor. (dynamic, dynamic, dynamic, dynamic) => NavigationInteractor { ?? ???????????????????} ???? ?Function 'initDeepLinkHandle':. (dynamic) => Futurevoid>* { ?? ???????????????????} ???? ?Function '_navigateDeepLink@547106886':. (dynamic, dynamic, {dynamic navigator}) => void { ? ???????????????????} ? ???????} ? Library:'package:anyapp/auth/navigation/AuthAccount.dart' Class: AuthAccount extends Account { ? PlainNotificationToken* _instance = sentinel; ? ?Function 'getAuthToken':. (dynamic, dynamic, dynamic, dynamic) => FutureAccessToken*>* { ? ???????????????????} ?? ?Function 'checkEmail':. (dynamic, dynamic) => Futurebool*>* { ? ???????????????????} ? ?Function 'validateRestoreCode':. (dynamic, dynamic, dynamic) => Futurebool*>* { ? ???????????????????} ? ?Function 'sendSmsRestorePassword':. (dynamic, dynamic) => Futurebool*>* { ? ???????????????????} ???????}
执行“reflutter main.ipa”命令之后,我们将拿到IPA文件。如果你想使用DartVM来查看哪些代码被加载了,你还需要在设备上运行应用程序,reFlutter会通过XCode和“reflutter”选项来输出结果:
如果你想要实现你自己的代码,reFlutter也支持我们使用专门的Docker来进行手动代码修改:
sudo docker pull ptswarm/reflutter
# Linux, Windows EXAMPLE BUILD ANDROID ARM64: ????sudo docker run -e WAIT=300 -e x64=0 -e arm=0 -e HASH_PATCH=Snapshot_Hash> -e COMMIT=Engine_commit> --rm -iv${PWD}:/t ptswarm/reflutter ? FLAGS: ????-e x64=0 ????????????????????????disables building for x64 archiitechture, use to reduce building time> ????-e arm=0 ????????????????????????disables building for arm archiitechture, use to reduce building time> ????-e WAIT=300 ?????????????????????the amount of time in seconds you need to edit source code> ????-e HASH_PATCH=[Snapshot_Hash] ???here you need to specify snapshot hash which matches the engine_commit line of enginehash.csv table best. It is used for proper patch search in reFlutter and for successfull compilation> ????-e COMMIT=[Engine_commit] ???????here you specify commit for your engine version, take it from enginehash.csv table or from flutter/engine repo>
reFlutter:【GitHub传送门】
https://github.com/patrickfav/uber-apk-signer/releases/tag/v1.2.1
https://github.com/ptswarm/reFlutter/blob/main/.github/workflows/main.yml
https://github.com/ptswarm/reFlutter/actions
https://github.com/ptswarm/reFlutter/blob/main/enginehash.csv
很赞哦! (119)