Skip to content
hack reveal logo png
HACK REVEAL
  • Home
  • Android
  • Windows
  • Hacks
    • Hacking
    • Reveals
  • Linux
    • kali Linux
    • Exploits
    • Metasploit
  • Tech
    • Cryptocurrency
  • AI Tools
  • Best Product
hack reveal logo png
HACK REVEAL
Binder Trace: a tool for intercepting and parsing Android Binder messages

Binder Trace: a tool for intercepting and parsing Android Binder messages

Prakash, 5, June 20235, June 2023

TABLE OF CONTENTS

  • 1 Binder Trace
  • 2 ⚙️ Installation
  • 3 Arguments
  • 4 ▶️ Starting binder trace
  • 5 ⌨️ Controls
  • 6 🔎 Filtering
    • 6.1 About The Author
      • 6.1.1 Prakash
    • 6.2 Related

Binder Trace

Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as “Wireshark for Binder”.

⚙️ Installation

You’ll need a rooted Android device or emulator.

  • (Linux only) – install xclip or xsel for “copy to clipboard” functionalitysudo apt-get install xclipsudo apt-get install xsel
  • Clone the repo and install python dependenciespip install -r binder_trace/requirements.txt
  • Check which version of frida is installed (make sure you’ve pip installed the requirements)pip list | grep frida
  • Download the matching version of frida-server from the frida releases page
  • Make sure adb is running as root, push frida-server to your device and run itadb rootadb push frida-server /data/local/tmpchmod u+x /data/local/tmp/frida-serveradb shell /data/local/tmp/frida-server

Arguments

ArgumentDescription
-hPrints the argument help.
-d DEVICEThe device to attach to e.g. “emulator-5554”. Use adb devices to list available devices. If not provided defaults to the USB device.
-p PIDThe pid of the process on DEVICE to attach to.
-n NAMEThe name of the process on DEVICE to attach to e.g. “Messaging”.
-s STRUCTPATHThe path to the directory of structure files.

▶️ Starting binder trace

To start binder trace we need to pick a device and process to attach to. In the following example we use adb and frida-ps to identify a process to attach to on a local emulator. As it’s an Android 11 emulator we choose the Android 11 structs directory. Pick the struct directory that most closely matches your version of Android. If you would like structures for a different version of Android, please let us know. Once it’s running start using the target app to generate some binder transactions.

> adb devices
List of devices attached
emulator-5554   device

> frida-ps -Ua
 PID  Name           Identifier
----  -------------  ----------------------------
8334  Messaging      com.android.messaging
7941  Phone          com.android.dialer
9607  Settings       com.android.settings

> cd binder_trace
> python -m binder_trace -d emulator-5554 -n Messaging -s ../structs/android11

⌨️ Controls

KeyAction
upMove up
downMove down
shift + upPage up
shift + downPage down
homeGo to top
endGo to bottom
tabNext pane
shift + tabPrevious pane
ctrl + cCopy pane to clipboard
fOpen filter options
hOpen help
qQuit

🔎 Filtering

If you’re interested in specific messages you can filter the displayed results with the following options.

  • Interface – limit results to interfaces that contain the case sensitive search string e.g. “com.android” or “Sms”.
  • Method – limit results to function names containing the specified case sensitive string.
  • Type – Limit results to certain types of messages e.g. requests or responses.

Once you’ve entered your filter options just press Enter to apply them.

Download

Also Read:

Reportly: is an AzureAD user activity report tool.

The Best Kali Linux Tools for Ethical Hackers

PentestGPT: A GPT-empowered penetration testing tool

Can Linux Be Hacked? Debunking the Myths and Facts

About The Author

Prakash

See author's posts

Related

Hacking Linux Best Ethical Hacking Toolslinux tools

Post navigation

Previous post
Next post

Related Posts

Hacking The 6 Best Programming language for hacking

The 6 Best Programming language for hacking

27, June 202312, September 2023

The world of hacking has become a source of immense curiosity and excitement in today’s digital landscape. Programming language play an important part in executing advanced hacking tactics behind the scenes of cybersecurity and penetration testing. This article looks into the world of hacking programming languages, analyzing their distinct characteristics,…

Read More
Cyber Security troubleshooting commands in linux

10 Best Troubleshooting Commands to Use in Linux

26, March 202326, March 2023

Troubleshooting commands in Linux are a set of commands that can help you identify and troubleshoot any issues with your system. These commands provide detailed information about the system’s hardware, software, and configuration. They can also be used to diagnose problems with applications or services running on the system. By…

Read More
Hacks

Advance Linux terminal commands for The Power users

11, July 202211, July 2022

One of the aspects of being a power user is to do even the simplest GUI-based tasks from the terminal. While this may seem like an unnecessary complication for some tasks, it is actually good practice to do even the simplest things from the terminal. This allows you to become…

Read More

Leave a ReplyCancel reply

Search

Recent Posts

  • How To Use AI To Earn $10,000 Monthly Online
  • How To Format Hard Drive On Your Windows PC
  • CEH v11 Certified Ethical Hacker PDF Download
  • RapidScan: The Ultimate Multi-Tool Web Vulnerability Scanner
  • Zphisher: The Ultimate Automated Phishing Tool Explained

Archives

  • Certified Ethical Hacker PDF
    CEH v11 Certified Ethical Hacker PDF Download
  • How to Use Photoshop's AI Generative Fill
    How to Use Photoshop’s AI Generative Fill In 2023
  • 40 Best Text to Video AI Tools
  • How to Fix “This account is not allowed to use WhatsApp” Error
    How to Fix “This account is not allowed to use WhatsApp” Error
  • 4 ways to hack cameras
    4 Ways To Hack CCTV Cameras And How To Prevent
  • AI Website Builders
    The 7 Best AI Website Builders In 2023
  • PhoneSploit Pro
    PhoneSploit Pro: Taking Phone Hacking to the Next Level
  • Bypass Your Android Screen Lock Without a Password
    How to Hack/Bypass Android Screen Lock Without a Password
  • Instagram Password Hacking
    Bruteinsta: The Ultimate Instagram Password Hacking Tool?
  • Burner Phone
    What is a Burner Phone: Everything You Need to Know
  • how to access Dark Web
    Exploring the Dark Web: How to Get Started Safely
  • anime face changer
    The Best Ai Anime Editor Apps For Android And iOS

AI News (5) AI Tools (10) Android (66) Best Product (29) ChatGPT (1) Cryptocurrency (5) Cyber Security (49) Deal (19) Exploits (11) Games (10) Hacking (80) Hacks (15) How To (65) kali Linux (41) Linux (70) Metasploit (6) Reveals (112) SEO (3) Tech (141) Uncategorized (2) Windows (71) Windows Tips (17)

©2023 HACK REVEAL | WordPress Theme by SuperbThemes