threads-api icon indicating copy to clipboard operation
threads-api copied to clipboard

Reverse engineering process

Open mariozuany opened this issue 2 years ago • 2 comments

Hi! I was also in the process of reverse engineering the Threads API when I stumbled upon your repository. Do you plan on documenting your reverse engineering process? I think it would be very valuable! :)

mariozuany avatar Jul 06 '23 14:07 mariozuany

Hi any updates on this?

ItzmeSwapy avatar Jul 06 '23 20:07 ItzmeSwapy

Prerequisites:

  • Android device with root access
  • Download latest Frida Server for Android
  • Install frida-tools: pip install frida-tools
  • Install adb (Android Debug Bridge): https://developer.android.com/studio/releases/platform-tools
  • Install mitmproxy: https://www.mitmproxy.org/downloads/

Instructions:

# Set up the proxy server
mitmweb --listen-host 0.0.0.0

# Use the proxy on your Android device
adb shell settings put global http_proxy $YOUR_IP:8080

# Copy frida-server onto Android device
adb push ~/Downloads/frida-server-$VERSION-android-$ARCH /data/local/tmp/frida-server
adb shell "chmod 755 /data/local/tmp/frida-server"

# Start frida-server in the background
adb shell "/data/local/tmp/frida-server &"

# Spawn the app with a Frida script
frida -U -f com.instagram.barcelona -l frida-ssl-bypass.js

Your homework is to write frida-ssl-bypass.js yourself (or find it on GitHub?)

aleclarson avatar Jul 16 '23 21:07 aleclarson