Discuz! Board

 找回密码
 立即注册
搜索
热搜: 活动 交友 discuz
查看: 1097|回复: 0
打印 上一主题 下一主题

JustTrustMe 原理分析

[复制链接]

1228

主题

1998

帖子

7598

积分

认证用户组

Rank: 5Rank: 5

积分
7598
跳转到指定楼层
楼主
发表于 2021-6-15 16:31:12 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式

https://blog.csdn.net/tangsilian/article/details/86612470

需求:在逆向某些app时通过fiddler抓包。没看到https的流量信息。

解决方法:发现是客户端对 SSL 证书进行了检测,这时候使用了xposed模块JustTrustMe来绕过解决了这个问题。


总结:查看SSL 证书进行了检测的原理,和绕过原理。

转自:https://bbs.pediy.com/thread-214012.htm

JustTrustMe 原理分析 ——挽秋1、JustTrustMe 简介

JustTrustMe 一个用来禁用、绕过 SSL 证书检查的基于 Xposed 模块。
项目地址:https://github.com/Fuzion24/JustTrustMe

2、实现原理分析

JustTrustMe 是将 APK 中所有用于校验 SSL 证书的 API 都进行了 Hook,从而绕过证书检
查的,所以弄请原理之前,先得弄清楚 Android 上实现 Https 通信有哪几种方式。

2.1Android 上实现 Https 的几种方式

1.通过 OkHttp 来实现
2.自定义证书和 HostnameVerify 来实现 Https 校验
3.通过 HttpsURLConnection 来实现HttpsURLConnection 中进行 SSL 证书校验

2.1.1 通过 OkHttp 来实现

OkHttp 是一个第三方库,OkHttp 中进行 SSL 证书校验,有如下两种方式:
1)CertificatePinner(证书锁定):
通过 CertificatePinner 进行连接的 OkHttp,在连接之前,会调用其 check 方法进行证书
校验。

实现代码如下:public OkHttpClient getUnsafeOkHttpClient() { OkHttpClient client = new OkHttpClient.Builder().certificatePinner( new CertificatePinner.Builder() .add("publicobject.com", "sha1/DmxUShsZuNiqPQsX2Oi9uv2sCnw=") .add("publicobject.com", "sha1/SXxoaOSEzPC6BgGmxAt/EAcsajw=") .add("publicobject.com", "sha1/blhOM3W9V/bVQhsWAcLYwPU6n24=") .add("publicobject.com", "sha1/T5x9IXmcrQ7YuQxXnxoCmeeQ84c=") .build()).build(); return client;}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

2)自定义证书和 HostnameVerify 来实现 Https 校验:
Okhttp 中如果不指定 HostnameVerifier 默认调用的是 OkHostnameVerifier.verify 进行服
务器主机名校验;如果设置了 HostnameVerifier,则默认调用的是自定义的 verify 方法。

实现代码如下:public OkHttpClient getCustomTrustedCertificatesOkHttpClient(Context context){ OkHttpClient client = null; SSLContext sslContext = sslContextForTrustedCertificates(context); //对于其他不是自定义证书的网站,可以通过自定义 HostnameVerify 来实现校验策略 client = new OkHttpClient.Builder() .sslSocketFactory(sslContext.getSocketFactory()).hostnameVerifier(newMyHostnameVerifier()).build(); return client;}public SSLContext sslContextForTrustedCertificates(Context context){ InputStream in = null; try{ context.getAssets().open("app_pay.cer"); //自定义的证书放到项目中的 assets 目录中 }catch (Exception e){ e.printStackTrace(); } return null;}private class MyHostnameVerifier implements HostnameVerifier { public boolean verify(String hostname, SSLSession session) { return true;//在这里进行主机名校验,此处未实现 }}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24

绕过上述 SSL 证书验证,Xposed 需要 Hook 的方法名和类名如下表所示:
类名 方法名

com.squareup.okhttp.CertificatePinner public void check(String hostname,List<Certificate> peerCertificates) throwsSSLPeerUnverifiedException{}com.squareup.okhttp.CertificatePinner public void check(String,List)okhttp3.internal.tls.OkHostnameVerifier public boolean verify(String, SSLSession)okhttp3.internal.tls.OkHostnameVerifier public boolean verify(String, X509Certificate)okhttp3.OkHttpClient.Builder public OkHttpClient.BuilderhostnameVerifier(HostnameVerifierhostnameVerifier)
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

JustTrustME 中的代码并没有 Hook (public OkHttpClient.Builder hostnameVerifier)这个方法,应
该是漏掉了这个方法。
对其中上述四个方法只需要 Hook 函数

InputStream ins = null; String result = ""; try { ins = context.getAssets().open("app_pay.cer"); //下载的证书放到项目中的 assets 目录中 CertificateFactory cerFactory = CertificateFactory .getInstance("X.509"); Certificate cer = cerFactory.generateCertificate(ins); KeyStore keyStore = KeyStore.getInstance("PKCS12", "BC"); keyStore.load(null, null); keyStore.setCertificateEntry("trust", cer); SSLSocketFactory socketFactory = new SSLSocketFactory(keyStore); Scheme sch = new Scheme("https", socketFactory, 443); mHttpClient = new DefaultHttpClient(); mHttpClient.getConnectionManager().getSchemeRegistry() .register(sch); } catch (Exception e) { } finally { try { if (ins != null) ins.close(); } catch (IOException e) { e.printStackTrace(); } } return mHttpClient;}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26

2)自定义 SSLSocketFactory 实现其中的 TrustManager 校验策略。

实现代码如下:public HttpClient getHttpClient() { HttpClient httpClient = null; // 初始化工作 try { KeyStore trustStore = KeyStore.getInstance(KeyStore .getDefaultType()); trustStore.load(null, null); SSLSocketFactory sf = new SSLSocketFactoryEx(trustStore); //sf.setHostnameVerifier(SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER); //允许所有主机的验证 sf.setHostnameVerifier(SSLSocketFactory.STRICT_HOSTNAME_VERIFIER); HttpParams params = new BasicHttpParams(); HttpProtocolParams.setVersion(params, HttpVersion.HTTP_1_1); HttpProtocolParams.setContentCharset(params, "utf-8"); HttpProtocolParams.setUseExpectContinue(params, true); // 设置连接管理器的超时 ConnManagerParams.setTimeout(params, 10000); // 设置连接超时 HttpConnectionParams.setConnectionTimeout(params, 10000); // 设置 socket 超时 HttpConnectionParams.setSoTimeout(params, 10000); // 设置 http https 支持 SchemeRegistry schReg = new SchemeRegistry(); schReg.register(new Scheme("http", PlainSocketFactory .getSocketFactory(), 80)); schReg.register(new Scheme("https", sf, 443)); ClientConnectionManager conManager = new ThreadSafeClientConnManager( params, schReg); httpClient = new DefaultHttpClient(conManager, params); } catch (Exception e) { e.printStackTrace(); return new DefaultHttpClient(); } return httpClient;}SSLSocketFactoryEx.javaclass SSLSocketFactoryEx extends SSLSocketFactory { SSLContext sslContext = SSLContext.getInstance("TLS"); public SSLSocketFactoryEx(KeyStore truststore) throws NoSuchAlgorithmException, KeyManagementException, KeyStoreException, UnrecoverableKeyException { super(truststore); TrustManager tm = new X509TrustManager() { @Override public java.security.cert.X509Certificate[] getAcceptedIssuers() { return null; } @Override public void checkClientTrusted( java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException { } @Override public void checkServerTrusted( java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException { } }; sslContext.init(null, new TrustManager[] { tm }, null); } @Override public Socket createSocket(Socket socket, String host, int port, boolean autoClose) throws IOException, UnknownHostException { return sslContext.getSocketFactory().createSocket(socket, host, port, autoClose); } @Override public Socket createSocket() throws IOException { return sslContext.getSocketFactory().createSocket(); }}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73

绕过上述 SSL 证书验证,Xposed 需要 Hook 的方法名和类名如下表所示:
类名 方法名
external/apachehttp/src/org/apache/http/impl/client/DefaultHttpClie
nt.java
public DefaultHttpClient()
external/apachehttp/src/org/apache/http/impl/client/DefaultHttpClie
nt.java
public DefaultHttpClient(HttpParams
params)
external/apachehttp/src/org/apache/http/impl/client/DefaultHttpClie
nt.java
public
DefaultHttpClient(ClientConnectionMa
nager conman, HttpParams params)
external/apachehttp/src/org/apache/http/conn/ssl/SSLSocketFactory.
java
public SSLSocketFactory(String,
KeyStore, String, KeyStore)
external/apachehttp/src/org/apache/http/conn/ssl/SSLSocketFactory.
java
public SSLSocketFactory(String,
KeyStore, String, KeyStore)
Hook 的 DefaultHttpClient 三个构造方法,对中都调用(ClientConnectionManager, HttpParams)
这个函数,其中重点需要 Hook 的是 ClientConnectionManager 这个参数,将其替换成如下函
数内容,让其信任所有证书:

public ClientConnectionManager getSCCM() { KeyStore trustStore; try { trustStore = KeyStore.getInstance(KeyStore.getDefaultType()); trustStore.load(null, null); SSLSocketFactory sf = new TrustAllSSLSocketFactory(trustStore); sf.setHostnameVerifier(SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER); SchemeRegistry registry = new SchemeRegistry(); registry.register(new Scheme("http", PlainSocketFactory.getSocketFactory(), 80)); registry.register(new Scheme("https", sf, 443)); ClientConnectionManager ccm = new SingleClientConnManager(null, registry); return ccm; } catch (Exception e) { return null; }}Hook 的 SSLSocketFactory 重点是替换其中 TrustManager,将其策略可以加载信任任意证书,替换后“TrustManager”代码如下:class ImSureItsLegitTrustManager implements X509TrustManager { @Override public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException{ } @Override public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException{ } @Override public X509Certificate[] getAcceptedIssuers() { return new X509Certificate[0]; }}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
2.1.3 通过 HttpsURLConnection 来实现HttpsURLConnection 中进行 SSL 证书校验,也分为两种方式:1)自定义的 HostnameVclass MyTrustManager implements X509TrustManager { @Override public void checkClientTrusted(X509Certificate[] x509Certificates, String s)throws CertificateException { } @Override public void checkServerTrusted(X509Certificate[] x509Certificates, String s)throws CertificateException { } @Override public X509Certificate[] getAcceptedIssuers() { return new X509Certificate[0]; }}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17

2)使用内置的证书初始化一个 KeyStore,实现 TrustManager
实现代码如下:

public HttpsURLConnection getHttpsURLConnectionByKeyStore(Context context, String url, Stringmethod) { URL u; HttpsURLConnection connection = null; try { SSLContext sslContext = getSSLContext(context); if (sslContext != null) { u = new URL(url); connection = (HttpsURLConnection) u.openConnection(); connection.setRequestMethod(method);//"POST" "GET" connection.setDoOutput(true); connection.setDoInput(true); connection.setUseCaches(false); connection.setRequestProperty("Content-Type", "binary/octet-stream"); connection.setSSLSocketFactory(sslContext.getSocketFactory()); connection.setConnectTimeout(30000); } } catch (Exception e) { e.printStackTrace(); } return connection;}private SSLContext getSSLContext(Context context) { try { // 服务器端需要验证的客户端证书 KeyStore keyStore = KeyStore.getInstance(KEY_STORE_TYPE_P12); // 客户端信任的服务器端证书 KeyStore trustStore = KeyStore.getInstance(KEY_STORE_TYPE_BKS); InputStream ksIn = context.getResources().getAssets().open(KEY_STORE_CLIENT_PATH); InputStream tsIn = context.getResources().getAssets().open(KEY_STORE_TRUST_PATH); try { keyStore.load(ksIn, KEY_STORE_PASSWORD.toCharArray()); trustStore.load(tsIn, KEY_STORE_TRUST_PASSWORD.toCharArray()); } catch (Exception e) { e.printStackTrace(); } finally { try { ksIn.close(); } catch (Exception ignore) { } try { tsIn.close(); } catch (Exception ignore) { } } SSLContext sslContext = SSLContext.getInstance("TLS"); TrustManagerFactory trustManagerFactory =TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm()); trustManagerFactory.init(trustStore); KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance("X509"); keyManagerFactory.init(keyStore, KEY_STORE_PASSWORD.toCharArray()); sslContext.init(keyManagerFactory.getKeyManagers(),trustManagerFactory.getTrustManagers(), null); return sslContext; } catch (Exception e) { Log.e("tag", e.getMessage(), e); } return null;}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59

绕过上述 SSL 证书验证,Xposed 需要 Hook 的方法名和类名如下表所示:
类名 方法名

libcore/luni/src/main/java/javax/net/ssl/TrustManagerFactory.javapublic final TrustManager[]getTrustManager()libcore/luni/src/main/java/javax/net/ssl/HttpsURLConnection.javapublic voidsetDefaultHostnameVerifier(HostnameVerifier)libcore/luni/src/main/java/javax/net/ssl/HttpsURLConnection.javapublic voidsetSSLSocketFactory(SSLSocketFactory)libcore/luni/src/main/java/javax/net/ssl/HttpsURLConnection.javapublic voidsetHostnameVerifier(HostNameVerifier)
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17

getTrustManager 的 Hook,跟 2.1.1 中替换方式一样,换成自定义的 TrustManager 让其信任
所有证书,此处不再列出代码。
其他三个函数都是“set”代码,只需要函数替换,不做任何操作即可。

2.1.4 WebView 加载 Https 页面时的证书校验

Android 中通过 WebView 加载 Https 页面时,如果出现证书校验错误,则会停止加载页
面,因为只需要 Hook 掉 webview 的证书校验失败的处理方法:onReceivedSslError,让其继
续加载即可。
类名 方法名

frameworks/base/core/java/android/webkit/WebViewClient.javapublic void onReceivedSslError(Webview,SslErrorHandler, SslError)frameworks/base/core/java/android/webkit/WebViewClient.javapublic void onReceivedError(WebView, int,String, String)
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

对于其中上述两个方法,只需要 webview 继续加载网页即可:handler.proceed()。

2.1.5 JustTrustMe 中其他 Hook 函数

JustTrustMe 中其他的 Hook 函数如下:
类名 方法名
external/apachehttp/src/org/apache/http/conn/ssl/SSLSocketF
actory.java
public static SSLSocketFactory
getSocketFactory()/已废弃
external/apachehttp/src/org/apache/http/conn/ssl/SSLSocketF
actory.java
public boolean isSecure(Socket)/已废弃
ch.boye.httpclientandroidlib.conn.ssl.Abstract
Verifier
verify(String, String[], String[], boolean)
前两个函数已经基本没有在使用,而第三个是使用的第三方的库——httpclientandroidlib
进行进行 https 连接的,该 jar14 年以后也没在更新了,几乎没人在使用,所以此处对着三个
函数不继续进行分析,有兴趣的可以继续进行升入分析。

顺便找到xposed高版本的兼容版本

TrustMeAlready https://github.com/ViRb3/TrustMeAlready

一个Xposed模块,在Android上禁用SSL验证和固定。全系统兼容

EdXposed(Android 9, Magisk-based and passes SafetyNet)
‘OG’ Xposed(Android 5-8)

原理如下:

hook这个类com.android.org.conscrypt.TrustManagerImpl下的函数的返回值:

public class Main implements IXposedHookZygoteInit {//在Zygote启动时调用,用于系统服务的Hook 回调方法initZygote()    private static final String SSL_CLASS_NAME = "com.android.org.conscrypt.TrustManagerImpl";    private static final String SSL_METHOD_NAME = "checkTrustedRecursive";    private static final Class<?> SSL_RETURN_TYPE = List.class;    private static final Class<?> SSL_RETURN_PARAM_TYPE = X509Certificate.class;    @Override    public void initZygote(StartupParam startupParam) throws Throwable {        XposedBridge.log("TrustMeAlready loading...");        int hookedMethods = 0;        for (Method method : findClass(SSL_CLASS_NAME, null).getDeclaredMethods()) {        //遍历com.android.org.conscrypt.TrustManagerImpl里面的方法 并hook            if (!checkSSLMethod(method)) {                continue;            }            List<Object> params = new ArrayList<>();            params.addAll(Arrays.asList(method.getParameterTypes()));            params.add(new XC_MethodReplacement() {                @Override                protected Object replaceHookedMethod(MethodHookParam param) throws Throwable {                    return new ArrayList<X509Certificate>();                }            });            XposedBridge.log("Hooking method:");            XposedBridge.log(method.toString());            findAndHookMethod(SSL_CLASS_NAME, null, SSL_METHOD_NAME, params.toArray());//将方法里的参数的返回值都改为 return new ArrayList<X509Certificate>();            hookedMethods++;        }        XposedBridge.log(String.format(Locale.ENGLISH, "TrustMeAlready loaded! Hooked %d methods", hookedMethods));    }    private boolean checkSSLMethod(Method method) {        if (!method.getName().equals(SSL_METHOD_NAME)) {            return false;        }        // check return type        if (!SSL_RETURN_TYPE.isAssignableFrom(method.getReturnType())) {            return false;        }        // check if parameterized return type        Type returnType = method.getGenericReturnType();        if (!(returnType instanceof ParameterizedType)) {            return false;        }        // check parameter type        Type[] args = ((ParameterizedType) returnType).getActualTypeArguments();        if (args.length != 1 || !(args[0].equals(SSL_RETURN_PARAM_TYPE))) {            return false;        }        return true;    }}
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61

使用frida 绕过android ssl

https://www.anquanke.com/post/id/86507

2.1.6 参考文章

https://docs.oracle.com/javase/7/docs/api/javax/net/ssl/SSLContext.html
http://www.apihome.cn/api/android/SSLSocketFactory.html
http://blog.sina.com.cn/s/blog_616e189f01018rpk.html
https://github.com/square/okhttp/wiki/HTTPS
https://square.github.io/okhttp/2.x/okhttp/com/squareup/okhttp/CertificatePinner.html
http://hc.apache.org/httpcomponents-clientga/httpclient/apidocs/org/apache/http/conn/ssl/SSLSocketFactory.html
http://pingguohe.net/2016/02/26/Android-App-secure-ssl.html
http://frodoking.github.io/2015/03/12/android-okhttp/


回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|Archiver|手机版|小黑屋|firemail ( 粤ICP备15085507号-1 )

GMT+8, 2024-5-17 21:25 , Processed in 0.059508 second(s), 19 queries .

Powered by Discuz! X3

© 2001-2013 Comsenz Inc.

快速回复 返回顶部 返回列表