Cedric’s Cruft

  • Blog
  • Tools
gdb (1)

Intercepting Android native library calls

Edit: at the time of writing, not many details could be disclosed as part of a responsible disclosure policy. The application in question was BlackBerry Messenger (com.bbm). BlackBerry did not respond to our findings. The full report is now available (unrevised version, including typos, mistakes, etc.). As part of a uni project, we’ve been busy […]

Read Post
2194 days ago 5 Comments Uncategorized Android, ARM, Dalvik, debugging, decompile, disassemble, gdb, LD_PRELOAD, loader, native libraries, shared object, SSL, wrap, Zygote
Recent Posts
  • Tracing API calls in Burp with Frida
  • SANS Holiday Hack Challenge 2015 writeup
  • SECCON 2015 – Reverse engineering Android APK 2 – 400 writeup
  • WordPress < 4.1.2 Stored XSS vulnerability
  • Reverse engineering the HITB binary 100 CTF challenge
Recent Comments
  • La historia de Unicode y su adopción en la web / Blog AGETIC on WordPress < 4.1.2 Stored XSS vulnerability
  • Igor Ganapolsky on Intercepting Android native library calls
  • Nils on Intercepting Android native library calls
  • cedric on Intercepting Android native library calls
  • Pipas on Intercepting Android native library calls
Archives
  • January 2017
  • January 2016
  • December 2015
  • April 2015
  • June 2014
  • December 2013
© 2013-2017 Cedric Van Bockhaven