Attacking the JNI Boundary with Frida

 

This blog entry provides a tutorial for less-experienced Android reverse-engineers on how to use the JNI boundary as an attack surface. It could also be taken as a demonstration of how unsafe the JNI is as a way to protect secrets.

 

Source code:

https://github.com/optiv/android-ndk-crackme

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?