frida-interception-and-unpinning
frida-interception-and-unpinning copied to clipboard
not able to sniff com.peacocktv.peacockandroid
so I have been trying to use this btw thank you very much... so my current setup is
android emulator, pixel 3a upsidedowncake, frida and proxyman,
what i did:
override config.js in this repo with my own cert_pem which proxyman i think puts in /Users/blabla/.proxyman/proxyman-ca.pem
then i ran the following:
frida -U \ 5s 09:14:59 AM
-l ./config.js \
-l ./native-connect-hook.js \
-l ./native-tls-hook.js \
-l ./android/android-proxy-override.js \
-l ./android/android-system-certificate-injection.js \
-l ./android/android-certificate-unpinning.js \
-l ./android/android-certificate-unpinning-fallback.js -f com.peacocktv.peacockandroid
what I see in logs:
____
/ _ | Frida 16.2.1 - A world-class dynamic instrumentation toolkit
| (_| |
> _ | Commands:
/_/ |_| help -> Displays the help system
. . . . object? -> Display information about 'object'
. . . . exit/quit -> Exit
. . . .
. . . . More info at https://frida.re/docs/home/
. . . .
. . . . Connected to Android Emulator 5554 (id=emulator-5554)
Spawning `com.peacocktv.peacockandroid`...
*** Starting scripts ***
== Redirecting all TCP connections to 192.168.20.162:9090 ==
[+] Patched 2 libssl.so verification methods
== Hooked native TLS lib libssl.so ==
Spawned `com.peacocktv.peacockandroid`. Resuming main thread!
[Android Emulator 5554::com.peacocktv.peacockandroid ]-> Ignoring unix:dgram connection
== Proxy system configuration overridden to 192.168.20.162:9090 ==
Rewriting <class: sun.net.spi.DefaultProxySelector>
Rewriting <class: java.net.ProxySelector>
Rewriting <class: android.net.PacProxySelector>
== Proxy configuration overridden to 192.168.20.162:9090 ==
[+] Injected cert into com.android.org.conscrypt.TrustedCertificateIndex
[ ] Skipped cert injection for org.conscrypt.TrustedCertificateIndex (not present)
[ ] Skipped cert injection for org.apache.harmony.xnet.provider.jsse.TrustedCertificateIndex (not present)
== System certificate trust injected ==
=== Disabling all recognized unpinning libraries ===
[+] javax.net.ssl.HttpsURLConnection setDefaultHostnameVerifier
[+] javax.net.ssl.HttpsURLConnection setSSLSocketFactory
[+] javax.net.ssl.HttpsURLConnection setHostnameVerifier
[+] javax.net.ssl.SSLContext init(KeyManager;[], TrustManager;[], SecureRandom)
[ ] com.android.org.conscrypt.CertPinManager isChainValid
[+] com.android.org.conscrypt.CertPinManager checkChainPinning
[+] android.security.net.config.NetworkSecurityConfig $init(*) (0)
[+] android.security.net.config.NetworkSecurityConfig $init(*) (1)
[+] com.android.okhttp.internal.tls.OkHostnameVerifier verify(String, SSLSession)
[+] com.android.okhttp.Address $init(String, int, Dns, SocketFactory, SSLSocketFactory, HostnameVerifier, CertificatePinner, Authenticator, Proxy, List, List, ProxySelector)
[ ] com.android.okhttp.Address $init(String, int, SocketFactory, SSLSocketFactory, HostnameVerifier, CertificatePinner, Authenticator, Proxy, List, List, ProxySelector)
[ ] okhttp3.CertificatePinner *
[ ] com.squareup.okhttp.CertificatePinner *
[ ] com.datatheorem.android.trustkit.pinning.PinningTrustManager *
[ ] appcelerator.https.PinningTrustManager *
[ ] nl.xservices.plugins.sslCertificateChecker *
[ ] com.worklight.wlclient.api.WLClient *
[ ] com.worklight.wlclient.certificatepinning.HostNameVerifierWithCertificatePinning *
[ ] com.worklight.androidgap.plugin.WLCertificatePinningPlugin *
[ ] com.commonsware.cwac.netsecurity.conscrypt.CertPinManager *
[ ] io.netty.handler.ssl.util.FingerprintTrustManagerFactory *
[ ] com.silkimen.cordovahttp.CordovaServerTrust *
[ ] com.appmattus.certificatetransparency.internal.verifier.CertificateTransparencyHostnameVerifier *
[ ] com.appmattus.certificatetransparency.internal.verifier.CertificateTransparencyInterceptor *
[ ] com.appmattus.certificatetransparency.internal.verifier.CertificateTransparencyTrustManager *
== Certificate unpinning completed ==
== Unpinning fallback auto-patcher installed ==
*** Scripts completed ***
Ignoring attempt to override http.proxyHost system property
Ignoring attempt to override https.proxyHost system property
Ignoring attempt to override http.proxyPort system property
Ignoring attempt to override https.proxyPort system property
Ignoring attempt to override http.nonProxyHosts system property
Ignoring attempt to override https.nonProxyHosts system property
=> android.security.net.config.NetworkSecurityConfig $init(*) (0)
=> android.security.net.config.NetworkSecurityConfig $init(*) (0)
=> javax.net.ssl.SSLContext init(KeyManager;[], TrustManager;[], SecureRandom)
Ignoring unix:stream connection
=> javax.net.ssl.SSLContext init(KeyManager;[], TrustManager;[], SecureRandom)
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
=> com.android.okhttp.Address $init(String, int, Dns, SocketFactory, SSLSocketFactory, HostnameVerifier, CertificatePinner, Authenticator, Proxy, List, List, ProxySelector)
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Connected tcp6 fd 111 to {"ip":"::ffff:192.168.20.162","port":9090} (-1)
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Error: access violation accessing 0x0
at <anonymous> (/Users/luisfernandez/development/frida-interception-and-unpinning/native-tls-hook.js:111)
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
=> com.android.okhttp.Address $init(String, int, Dns, SocketFactory, SSLSocketFactory, HostnameVerifier, CertificatePinner, Authenticator, Proxy, List, List, ProxySelector)
Ignoring unix:stream connection
Ignoring unix:stream connection
=> com.android.okhttp.Address $init(String, int, Dns, SocketFactory, SSLSocketFactory, HostnameVerifier, CertificatePinner, Authenticator, Proxy, List, List, ProxySelector)
Ignoring unix:stream connection
Connected tcp6 fd 193 to {"ip":"::ffff:192.168.20.162","port":9090} (-1)
Ignoring unix:stream connection
Ignoring unix:stream connection
Connected tcp6 fd 194 to {"ip":"::ffff:192.168.20.162","port":9090} (-1)
Ignoring unix:stream connection
Ignoring unix:stream connection
Connected tcp6 fd 200 to {"ip":"::ffff:192.168.20.162","port":9090} (-1)
Ignoring unix:stream connection
!!! --- Unexpected TLS failure --- !!!
CertificateException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
Thrown by com.android.org.conscrypt.TrustManagerImpl->checkTrustedRecursive
Error: access violation accessing 0x0
at <anonymous> (/Users/luisfernandez/development/frida-interception-and-unpinning/native-tls-hook.js:111)
Ignoring unix:stream connection
Ignoring unix:stream connection
Ignoring unix:stream connection
=> com.android.okhttp.Address $init(String, int, Dns, SocketFactory, SSLSocketFactory, HostnameVerifier, CertificatePinner, Authenticator, Proxy, List, List, ProxySelector)
Ignoring unix:stream connection
Ignoring unix:stream connection
Connected tcp6 fd 263 to {"ip":"::ffff:192.168.20.162","port":9090} (-1)
=> android.security.net.config.NetworkSecurityConfig $init(*) (0)
=> javax.net.ssl.SSLContext init(KeyManager;[], TrustManager;[], SecureRandom)
=> com.android.okhttp.Address $init(String, int, Dns, SocketFactory, SSLSocketFactory, HostnameVerifier, CertificatePinner, Authenticator, Proxy, List, List, ProxySelector)
Ignoring unix:stream connection
Ignoring unix:stream connection
Connected tcp6 fd 258 to {"ip":"::ffff:192.168.20.162","port":9090} (-1)
!!! --- Unexpected TLS failure --- !!!
Error: access violation accessing 0x0
at <anonymous> (/Users/luisfernandez/development/frida-interception-and-unpinning/native-tls-hook.js:111)
Ignoring unix:dgram connection
Ignoring unix:dgram connection
Ignoring unix:dgram connection
Ignoring unix:dgram connection
Ignoring unix:dgram connection
Process crashed: Bad access due to invalid address
***
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'google/sdk_gphone64_arm64/emu64a:14/UE1A.230829.036.A1/11228894:userdebug/dev-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2024-06-13 09:16:38.135366769-0400
Process uptime: 4s
Cmdline: com.peacocktv.peacockandroid
pid: 11119, tid: 11305, name: NR_Harvester-1 >>> com.peacocktv.peacockandroid <<<
uid: 10191
tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x00000000fe94fe30
x0 00000073ba56d7a8 x1 00000073ba56c1e0 x2 0000000000000008 x3 00000073ba56d7a4
x4 00000073ba56dd80 x5 00000073ba56dbe8 x6 0000000000000027 x7 2720646165726874
x8 0000000000000076 x9 000000000001000a x10 00000073ba56c360 x11 000000000000000a
x12 0000000000000000 x13 0000000000000000 x14 0000000000000008 x15 0000000000000000
x16 000000744fa10a30 x17 00000076e96e8a40 x18 0000000000000000 x19 00000073ba56d7a8
x20 00000000fe94fe20 x21 00000073ba56d7a4 x22 000000000000ffff x23 00000073ba56c1e0
x24 00000073ba571000 x25 000000744f580a5c x26 00000073ba56d7a8 x27 b400007645852930
x28 000000744fc16000 x29 00000073ba56d6a0
lr 000000744f23cdbc sp 00000073ba56d660 pc 000000744f340780 pst 0000000000001000
75 total frames
backtrace:
#00 pc 0000000000340780 /apex/com.android.art/lib64/libart.so (art::FindOatMethodFor(art::ArtMethod*, art::PointerSize, bool*) (.__uniq.231987612005477677052516648077052451092.llvm.494659047661038854)+128) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#01 pc 000000000023cdb8 /apex/com.android.art/lib64/libart.so (void art::StackVisitor::WalkStack<(art::StackVisitor::CountTransitions)0>(bool)+6324) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#02 pc 000000000026e1e0 /apex/com.android.art/lib64/libart.so (art::Thread::ThrowNewWrappedException(char const*, char const*)+412) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#03 pc 000000000028d54c /apex/com.android.art/lib64/libart.so (art::ThrowIllegalMonitorStateExceptionF(char const*, ...) (.__uniq.137044065544711739518426728593693908610)+228) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#04 pc 00000000002444fc /apex/com.android.art/lib64/libart.so (art::Monitor::FailedUnlock(art::ObjPtr<art::mirror::Object>, unsigned int, unsigned int, art::Monitor*)+2120) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#05 pc 0000000000243414 /apex/com.android.art/lib64/libart.so (art::Monitor::MonitorExit(art::Thread*, art::ObjPtr<art::mirror::Object>)+2120) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#06 pc 000000000042886c /apex/com.android.art/lib64/libart.so (artJniUnlockObject+52) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#07 pc 0000000000427e6c /apex/com.android.art/lib64/libart.so (artQuickGenericJniEndTrampoline+988) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#08 pc 0000000000377040 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+160) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#09 pc 000000000058ac0c /apex/com.android.art/lib64/libart.so (nterp_helper+3852) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#10 pc 0000000000024b48 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.NativeSsl.readDirectByteBuffer+32)
#11 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#12 pc 0000000000019d1c /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngine.readPlaintextDataDirect+12)
#13 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#14 pc 0000000000019cc0 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngine.readPlaintextData+44)
#15 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#16 pc 000000000001a7b6 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngine.unwrap+606)
#17 pc 000000000058b358 /apex/com.android.art/lib64/libart.so (nterp_helper+5720) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#18 pc 000000000001a9e8 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngine.unwrap+56)
#19 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#20 pc 000000000001a43a /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngine.unwrap+22)
#21 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#22 pc 0000000000017f3c /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket+140)
#23 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#24 pc 0000000000017e4c /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.-$$Nest$mprocessDataFromSocket+0)
#25 pc 0000000000589d34 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#26 pc 0000000000019184 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngineSocket.doHandshake+108)
#27 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#28 pc 000000000001950e /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngineSocket.startHandshake+58)
#29 pc 000000000003539c /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.io.RealConnection.connectTls+636) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#30 pc 0000000000034cf0 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.io.RealConnection.connectSocket+1104) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#31 pc 0000000000036450 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.io.RealConnection.connect+864) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#32 pc 000000000002810c /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.http.StreamAllocation.findConnection+924) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#33 pc 000000000002839c /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.http.StreamAllocation.findHealthyConnection+76) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#34 pc 0000000000028c2c /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.http.StreamAllocation.newStream+76) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#35 pc 000000000002041c /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.http.HttpEngine.connect+316) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#36 pc 0000000000024700 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.http.HttpEngine.sendRequest+848) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#37 pc 000000000002a1f4 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.huc.HttpURLConnectionImpl.execute+388) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#38 pc 000000000002c4a4 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.huc.HttpURLConnectionImpl.getOutputStream+68) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#39 pc 00000000000341b8 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.huc.HttpsURLConnectionImpl.getOutputStream+56) (BuildId: ef70c02fb1e4aadf4cf4de165c164a4fe438ff55)
#40 pc 000000000058acb0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#41 pc 0000000002f1d5b4 /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.HarvestConnection.send+164)
#42 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#43 pc 0000000002f1d8a6 /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.HarvestConnection.sendData+34)
#44 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#45 pc 0000000002f1d868 /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.HarvestConnection.sendData+8)
#46 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#47 pc 0000000002f1fa9a /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.Harvester.connected+386)
#48 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#49 pc 0000000002f2017c /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.Harvester.execute+152)
#50 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#51 pc 0000000002f1fec8 /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.Harvester.disconnected+132)
#52 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#53 pc 0000000002f2018a /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.Harvester.execute+166)
#54 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#55 pc 0000000002f20bac /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.Harvester.uninitialized+184)
#56 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#57 pc 0000000002f20192 /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.Harvester.execute+174)
#58 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#59 pc 0000000002f1ed8e /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.HarvestTimer.tick+66)
#60 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#61 pc 0000000002f1ef02 /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.HarvestTimer.tickIfReady+166)
#62 pc 000000000058ac54 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#63 pc 0000000002f1eb56 /data/app/~~d9gWpYiAcvv9G0Bk7q29ew==/com.peacocktv.peacockandroid-_wVeth8-epz6Az5zfkHSng==/oat/arm64/base.vdex (com.newrelic.agent.android.harvest.HarvestTimer.run+10)
#64 pc 00000000001baae4 /system/framework/arm64/boot.oat (java.util.concurrent.Executors$RunnableAdapter.call+68) (BuildId: 5f2ff7f6c842c7ab341edeabcf35b2bcaddb338c)
#65 pc 0000000000255d18 /system/framework/arm64/boot.oat (java.util.concurrent.FutureTask.runAndReset+184) (BuildId: 5f2ff7f6c842c7ab341edeabcf35b2bcaddb338c)
#66 pc 00000000002f4030 /system/framework/arm64/boot.oat (java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run+160) (BuildId: 5f2ff7f6c842c7ab341edeabcf35b2bcaddb338c)
#67 pc 00000000002b4d8c /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+796) (BuildId: 5f2ff7f6c842c7ab341edeabcf35b2bcaddb338c)
#68 pc 00000000002b1eb0 /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+64) (BuildId: 5f2ff7f6c842c7ab341edeabcf35b2bcaddb338c)
#69 pc 0000000000160778 /system/framework/arm64/boot.oat (java.lang.Thread.run+72) (BuildId: 5f2ff7f6c842c7ab341edeabcf35b2bcaddb338c)
#70 pc 00000000003605a4 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#71 pc 000000000034b8a4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+144) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#72 pc 00000000004f3e30 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+1888) (BuildId: b10f5696fea1b32039b162aef3850ed3)
#73 pc 00000000000cb6a8 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+208) (BuildId: a87908b48b368e6282bcc9f34bcfc28c)
#74 pc 000000000006821c /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: a87908b48b368e6282bcc9f34bcfc28c)
***
[Android Emulator 5554::com.peacocktv.peacockandroid ]->
Thank you for using Frida!
The app starts and then shuts off.
this is what i see in when i use adb logcat -T1
06-13 09:25:18.123 522 1971 W ActivityManager: Exception when unbinding service com.peacocktv.peacockandroid/org.chromium.content.app.SandboxedProcessService0:0
06-13 09:25:18.123 522 1971 W ActivityManager: android.os.DeadObjectException
06-13 09:25:18.123 522 1971 W ActivityManager: at android.os.BinderProxy.transactNative(Native Method)
06-13 09:25:18.123 522 1971 W ActivityManager: at android.os.BinderProxy.transact(BinderProxy.java:584)
06-13 09:25:18.123 522 1971 W ActivityManager: at android.app.IApplicationThread$Stub$Proxy.scheduleUnbindService(IApplicationThread.java:1419)
06-13 09:25:18.123 522 1971 W ActivityManager: at com.android.server.am.ActiveServices.removeConnectionLocked(ActiveServices.java:5896)
06-13 09:25:18.123 522 1971 W ActivityManager: at com.android.server.am.ActiveServices.killServicesLocked(ActiveServices.java:6432)
06-13 09:25:18.123 522 1971 W ActivityManager: at com.android.server.am.ActivityManagerService.cleanUpApplicationRecordLocked(ActivityManagerService.java:12989)
06-13 09:25:18.123 522 1971 W ActivityManager: at com.android.server.am.ActivityManagerService.handleAppDiedLocked(ActivityManagerService.java:3338)
06-13 09:25:18.123 522 1971 W ActivityManager: at com.android.server.am.ActivityManagerService.appDiedLocked(ActivityManagerService.java:3453)
06-13 09:25:18.123 522 1971 W ActivityManager: at com.android.server.am.ActivityManagerService$AppDeathRecipient.binderDied(ActivityManagerService.java:1583)
06-13 09:25:18.123 522 1971 W ActivityManager: at android.os.IBinder$DeathRecipient.binderDied(IBinder.java:319)
06-13 09:25:18.123 522 1971 W ActivityManager: at android.os.BinderProxy.sendDeathNotice(BinderProxy.java:704)