Attacking the JNI Boundary with Frida
This blog entry provides a tutorial for less-experienced Android reverse-engineers on how to use the JNI boundary as an attack surface. It could also be taken as a demonstration of how unsafe the JNI is as a way to protect secrets.
Source code:
-
Copyright © 2021 Optiv Security Inc. All rights reserved.
-
No license, express or implied, to any intellectual property or other content is granted or intended hereby.
-
This blog is provided to you for information purposes only. While the information contained in this site has been obtained from sources believed to be reliable, Optiv disclaims all warranties as to the accuracy, completeness or adequacy of such information.
-
Links to third party sites are provided for your convenience and do not constitute an endorsement by Optiv. These sites may not have the same privacy, security or accessibility standards.
-
Complaints / questions should be directed to Legal@optiv.com