Android EagleEye笔记

前言:

Android EagleEye官方介绍在 https://github.com/MindMac/AndroidEagleEye/blob/master/README-zh.md

    "Android EagleEye是一个基于Xposed和adbi的应用,可以实现对Android Java和Native方法的Hook,最终会将Hook的方法相关信息以Log的形式输出,包括应用的uid、方法名称、参数信息、返回值等。"

真的像鹰眼检测应用调用了哪些api,作者很厉害!


作为笔记来说,是官方readme的补充,也是自己的备忘。

笔记1,EagleEye源码能否修改再重新打包?

能,修改代码后直接安装就可以了。这里我遇到的坑是运行后死活没用,基于现在浮躁的

人心,网上一通乱搜,看上面readme没啥发现,作者没讲打包部署。还是一句话,人别浮躁,脑子要清醒,

坐下来看人家用了啥。 Xposed框架,重点是这个,所以理所当然去查看Xposed而不是网上一通搜这个EagleEye

怎么不起作用了,怎么这样那样都不行,都3天了急,在线等。。。。哥们,没人理你的,等到头发白也没用!

Xposed部署wiki 

人家官方好好躺着答案呢,不谢!

xposed 相关下载:

http://repo.xposed.info/module/de.robv.android.xposed.installer


pid uid 获取 http://blog.csdn.net/jiaoli_82/article/details/49802613


笔记2:

查看Eagleye调用栈:

FileHook.java中调用如下代码:

StackTraceElement[] stackTraceElements = Thread.currentThread().getStackTrace();
for (StackTraceElement stackTraceElement :stackTraceElements){
   Log.e("evab","className = "+stackTraceElement.getClassName()+ " | method = "+stackTraceElement.getMethodName());
}

打印结果如下:

12-17 11:20:54.295 1262-1335/com.happyelements.AndroidAnimal E/evan: FileHook  filePath = /system/bin/su
12-17 11:20:54.322 1262-1335/com.happyelements.AndroidAnimal E/evab: className = dalvik.system.VMStack | method = getThreadStackTrace
12-17 11:20:54.323 1262-1335/com.happyelements.AndroidAnimal E/evab: className = java.lang.Thread | method = getStackTrace
12-17 11:20:54.323 1262-1335/com.happyelements.AndroidAnimal E/evab: className = com.mindmac.eagleeye.hookclass.FileHook | method = antiAntiEmu
12-17 11:20:54.323 1262-1335/com.happyelements.AndroidAnimal E/evab: className = com.mindmac.eagleeye.hookclass.FileHook | method = logSpecial
12-17 11:20:54.323 1262-1335/com.happyelements.AndroidAnimal E/evab: className = com.mindmac.eagleeye.hookclass.FileHook | method = after
12-17 11:20:54.323 1262-1335/com.happyelements.AndroidAnimal E/evab: className = com.mindmac.eagleeye.service.Launcher$3 | method = afterHookedMethod
12-17 11:20:54.324 1262-1335/com.happyelements.AndroidAnimal E/evab: className = de.robv.android.xposed.XposedBridge | method = handleHookedMethod
12-17 11:20:54.324 1262-1335/com.happyelements.AndroidAnimal E/evab: className = java.io.File | method = exists
12-17 11:20:54.324 1262-1335/com.happyelements.AndroidAnimal E/evab: className = java.lang.reflect.Method | method = invoke
12-17 11:20:54.324 1262-1335/com.happyelements.AndroidAnimal E/evab: className = java.lang.reflect.Method | method = invoke
12-17 11:20:54.336 1262-1335/com.happyelements.AndroidAnimal E/evab: className = org.keplerproject.luajava.LuaJavaAPI | method = invokeMethod
12-17 11:20:54.340 1262-1335/com.happyelements.AndroidAnimal E/evab: className = org.keplerproject.luajava.LuaJavaAPI | method = objectIndex
12-17 11:20:54.345 1262-1335/com.happyelements.AndroidAnimal E/evab: className = org.cocos2dx.lib.Cocos2dxRenderer | method = nativeInit
12-17 11:20:54.345 1262-1335/com.happyelements.AndroidAnimal E/evab: className = org.cocos2dx.lib.Cocos2dxRenderer | method = onSurfaceCreated
12-17 11:20:54.346 1262-1335/com.happyelements.AndroidAnimal E/evab: className = android.opengl.GLSurfaceView$GLThread | method = guardedRun
12-17 11:20:54.346 1262-1335/com.happyelements.AndroidAnimal E/evab: className = android.opengl.GLSurfaceView$GLThread | method = run

后记:

目的1本笔记是为防止忘记,所以做个记录,当然更多是一种净化大家的浮躁,也许是我自己浮躁想让自己平静而已。

目的2是说 深入 Xposed或者 Eagleye 还有待时间继续学习,加油!

评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值