Skip to content

Commit

Permalink
Updated README
Browse files Browse the repository at this point in the history
  • Loading branch information
federicodotta committed Apr 18, 2018
1 parent 3b4d6dd commit d82a245
Show file tree
Hide file tree
Showing 2 changed files with 36 additions and 10 deletions.
Binary file modified BridaScreen1.PNG
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
46 changes: 36 additions & 10 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,36 +3,62 @@
</p>

# Brida
Brida is a Burp Suite Extension that, working as a bridge between [Burp Suite](https://portswigger.net/burp/) and [Frida](https://www.frida.re/), lets you use and manipulate applications’ own methods while tampering the traffic exchanged between the applications and their back-end services/servers. It supports all platforms supported by Frida (Windows, macOS, Linux, iOS, Android, and QNX)
Brida is a Burp Suite Extension that, working as a bridge between [Burp Suite](https://portswigger.net/burp/) and [Frida](https://www.frida.re/), lets you use and manipulate applications’ own methods while tampering the traffic exchanged between the applications and their back-end services/servers. It supports all platforms supported by Frida (Windows, macOS, Linux, iOS, Android, and QNX).

# Authors
- Piergiovanni Cipolloni, Security Advisor at @ Mediaservice.net
- Federico Dotta, Security Advisor at @ Mediaservice.net
- Piergiovanni Cipolloni, Security Advisor at @Mediaservice.net
- Federico Dotta, Security Advisor at @Mediaservice.net

# Contributors
- Maurizio Agazzini, Senior Security Advisory at @ Mediaservice.net
- Maurizio Agazzini, Senior Security Advisor at @Mediaservice.net

# Frida Scripts
The 0.2 version of Brida uses a lot of Frida code for dynamic hooking and for binary inspection, based on the work of:
- Marco Ivaldi
- Maurizio Agazzini
- Luca Baggio

# Brida Idea
This idea is a need that is born during the analysis of some mobile application that use strong symmetric cryptography using random keys, without knowing the correct secret all data was not modifiable via Burp neither with a custom plugin. More generally, applications' logic could be based on cryptographic tokens, it could use a complex challenge-response algorithm as well, and so on. How can we tamper the messages? Most of the times the only viable approach is to decompile/disassemble the application, identify the functions or methods we’re interested in AND re-implement them. This approach is obviously time consuming and not always really viable: i.e. the generation of tokens and/or the encryption routines could be based on cryptographic material strictly tied to the device (state) or stored inside protected areas and thus not directly accessible... That’s when Brida comes in handy: instead of trying to extract keys/certificates and re-writing the routines we’re interested in, why don’t we let the application do the dirty work for us?

# Brida 0.2
Brida 0.2 was presented at Hack In The Box 2018 Amsterdam and includes some new features that speed up dynamical analysis of mobile applications, including:
- An integrated console in which output from all Frida and Brida hooks are printed
- An integrated JS editor with Javascript syntax highlighting, in order to be able to add your own Frida exports and Frida hooks directly from Burp Suite
- An analysis tab, in which you have a tree rapresentation of the binary (Java/OBJC classes and methods, inports/exports) and from which you can graphically add inspection hoooks (that print arguments and return value every time that the hooked function is executed) and tamper hooks (that dinamically change the return value of the hooked function every time that it is executed)

# Requirements
In order to be able to use Brida, you need:
1. Burp Suite
2. Frida client
3. Pyro4
4. A jailbroken iOS device/rooted Android device with frida-server running on it
5. An application to analyze! :D

Brida can be used also with Frida gadget on a non-jailbroken iOS device. We will soon explain better how to configure the tool in a step-by-step guide also in this particular situation!

# Installation
1. Install Python 2.7 and Pyro4 (pip install pyro4)
2. Download Burp Suite: http://portswigger.net/burp/download.html
3. Install Brida from the BApp Store (not available yet) or follow these steps:
4. Download the last release of Brida
5. Open Burp -> Extender -> Extensions -> Add -> Choose BridaXX.jar file
6. Use Brida to generate stubs for your custom extensions or use Brida directly to call Frida exported functions
3. Download the last release of Brida
4. Open Burp -> Extender -> Extensions -> Add -> Choose BridaXX.jar file
5. Use Brida to generate stubs for your custom extensions or use Brida directly to call Frida exported functions

# Usage and examples
A brief article containing details on usage and various examples can be found at:
https://techblog.mediaservice.net/2017/07/brida-advanced-mobile-application-penetration-testing-with-frida/
- https://techblog.mediaservice.net/2017/07/brida-advanced-mobile-application-penetration-testing-with-frida/

Slides of our conference presented at Hack In The Box 2018 Amsterdam that describes the new features of the version 0.2 can be found at:
- https://conference.hitb.org/hitbsecconf2018ams/materials/D1T1%20-%20Federico%20Dotta%20and%20Piergiovanni%20Cipolloni%20-%20Brida%20When%20Burp%20Suite%20Meets%20Frida.pdf

A step-by-step guide will be published soon!

# Screenshot
![Brida Screenshot](https://raw.githubusercontent.com/federicodotta/Brida/master/BridaScreen1.PNG)

# MIT License

Copyright (c) 2017 Brida
Copyright (c) 2018 Brida

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

Expand Down

0 comments on commit d82a245

Please sign in to comment.