Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

pixel4、android11、arm64-v8a hook不成功 #3

Open
jiangchengbo opened this issue Jul 2, 2023 · 0 comments
Open

pixel4、android11、arm64-v8a hook不成功 #3

jiangchengbo opened this issue Jul 2, 2023 · 0 comments

Comments

@jiangchengbo
Copy link

直接下载按照文档编译,执行inject后立即退出了程序,界面没有绘制
日志如下:
07-02 18:31:14.804 16855 16855 W INJECT : [+] Injecting process: 641
07-02 18:31:14.807 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.807 16855 16855 W INJECT : [+] Remote mmap address: 77937fb410
07-02 18:31:14.807 16855 16855 W INJECT : [+] Calling mmap in target process.
07-02 18:31:14.807 16855 16855 W INJECT : [+] Target process returned from mmap, return value=0, pc=77937fb410
07-02 18:31:14.809 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.813 16855 16855 I chatty : uid=0(root) ./inject identical 2 lines
07-02 18:31:14.815 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.815 16855 16855 W INJECT : [+] Get imports: dlopen: 7793605014, dlsym: 7793605040, dlclose: 7793605084, dlerror: 779360502c
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlopen in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlopen, return value=0, pc=7793605014
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlerror in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlerror, return value=0, pc=779360502c
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlsym in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlsym, return value=0, pc=7793605040
07-02 18:31:14.815 16855 16855 W INJECT : hook_entry_addr666 = 0x0
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling hook_entry in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from hook_entry, return value=200, pc=0

这个hook_entry的地址是不是有问题?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant