Pentest & Bug Bounty Resources and Techniques
  • Pentest & Bug Bounty Resources and Techniques
    • Introduction
    • Tests Checklist
    • OSINT
    • Communications Security
      • SSL/TLS
    • Networking
      • Subdomains Discovery
        • DNS & OSINT
        • DNS Brute force
          • Second DNS Brute-Force Round
      • Subdomain Takeover
      • Network Host Scan/Discovery
        • External/Internal
        • Internal only
      • Network Vulnerability Scanning
      • Network Hacking
      • Parsing
      • Reporting
    • Brute Force
      • Wordlists
      • Databases
      • SSH
    • Web
      • Endpoint Discovery
      • Infrastructure & Configuration
        • Headers
        • WAF Detection/ Evasion
      • Injection
        • GraphQL
        • Cross-Site Scripting (XSS)
        • SQL Injection
        • Payloads
      • SSRF & XXE
        • Labs & Resources
        • Tools
        • SVG SSRF Cheatsheet
        • XXE - XEE - XML External Entity
      • JWT Vulnerabilities (Json Web Tokens)
      • HTTP/S DoS
    • Mobile
      • Both
        • SAST
          • MobSF
        • DAST
          • Installing Frida and Objection
      • Android
        • Create a Lab
          • Rooting Android Emulator
          • Rooting Android Emulator Cheat Sheet
        • APK Certificates
        • SAST
          • APKs
            • Get Information from APK
            • GDA (GJoy Dex Analysizer)
            • Scanning APK for URIs, endpoints & secrets
            • Google Maps API Scanner
        • DAST
          • Rooting the Android Studio AVDs
          • non-Rooted devices
            • Bypass SSL Pinning - non-rooted devices
              • Method 1: apk-mitm
              • Instrumentation with Frida and Objection
                • Bypass SSL Pinning - Method 2: With Objection Explore
                • Bypass SSL Pinning - Method 3: With root_bypass.js
          • Rooted Devices
            • Run frida-server in the emulator or device
            • Inject Frida
            • Bypass SSL Pinning - rooted devices
              • Install Burp CA as a system-level CA on the device
      • iOS
        • SAST
          • Building a reverse iOS engineering environment for free
          • Test Vulnerabilities
  • Lets Practice
    • Virtual Machines
    • Vulnerable App
    • Guided Labs
    • CTFs
  • Group 1
    • AI
Powered by GitBook
On this page
  • Upload frida-server
  • Run frida-server persistently using nohup
  • Summary
  1. Pentest & Bug Bounty Resources and Techniques
  2. Mobile
  3. Android
  4. DAST
  5. Rooted Devices

Run frida-server in the emulator or device

PreviousRooted DevicesNextInject Frida

Last updated 4 years ago

If you want just a steps summary, go to

Upload frida-server

First, let's test to make sure that we have working connectivity over ADB (Android Debug Bridge).

This lab is also covered off in the .

1. Open a command line and type adb devices

Make sure you have exactly the same frida version on device and on the PC. If not, you will get many errors.

3. Push it to /data/local/tmp with adb push frida-server-XX.Y.ZZ-android-ARCH /data/local/tmp

4. Obtain root with adb root, then connect to your device with adb shell. Navigate to the /data/local/tmp directory with cd /data/local/tmp .

5. At this point it's preferred to rename frida-server-XX.Y.ZZ-android-ARCHto something a little less annoying to type: mv frida-server-XX.Y.ZZ-android-ARCH frida-server

6. Make the server executable with chmod 777 frida-server

Run frida-server persistently using nohup

7. Start the server with nohup ./frida-server &

The reason we are using nohup is to keep the process running even if we close our ADB terminal. You can absolutely just run ./frida-server but then you must be mindful not to close the window.

Summary

adb push frida-server-XX.Y.ZZ-android-ARCH /data/local/tmp
adb root
adb shell
cd /data/local/tmp
mv frida-server-XX.Y.ZZ-android-ARCH frida-server
chmod 777 frida-server
nohup ./frida-server &

2. In order for frida to work, you need it's companion frida-server, to be running on the device. You can download it from the frida .

Make sure you get the one corresponding with your device architecture. It could be "android-x86", "android-arm", etc. To see how to get the architecture, please refer to

Download frida from and then:

releases page on Github
https://stackoverflow.com/questions/6630386/how-to-find-arm-processor-version-on-android-device
releases page on Github
Summary
Environment Setup video walkthrough
List of devices connected to PC