Delivery of callbacks potentially impacted by the Frida script
Hallo, i'm working on some project & using this awesome package, but i got info from my team, that this package still can bypass with this script
https://codeshare.frida.re/@muhammadhikmahhusnuzon/bypass-talsec-rasp-and-root-detection/
Can you check this issue please 🙏🙏🙏
Hi @naufalmms,
Thanks for your submission! What version did you test it with? It seems to be some kind of UI-level threat reactions cut-off bypass.
The purpose of freeRASP is to detect threats and help you understand your security posture on the Talsec Portal. For more advanced attacks (like such UI threat reaction cut-off ones), you’ll need to use the RASP+ and AppiCrypt premium products, which offer enhanced protection against such hooking scripts: https://www.talsec.app/#plans
Best regards,
Tomas Soukal, Talsec Product Owner
Thanks for replay, We using version 7.2.0
Hi @naufalmms,
Thanks for your submission! What version did you test it with? It seems to be some kind of UI-level threat reactions cut-off bypass.
The purpose of freeRASP is to detect threats and help you understand your security posture on the Talsec Portal. For more advanced attacks (like such UI threat reaction cut-off ones), you’ll need to use the RASP+ and AppiCrypt premium products, which offer enhanced protection against such hooking scripts: https://www.talsec.app/#plans
Best regards, Tomas Soukal, Talsec Product Owner