native-code-analysis

1 article
sort: new top best
clear filter
0 8/10

Researcher bypassed custom token-based brute force protection in an Android mobile app by reverse-engineering a native .so library with JADX, extracting it via ADB, analyzing it with IDA, and using FRIDA to dynamically inject JavaScript that overloaded the token generation function at runtime, allowing arbitrary token generation and defeating the rate-limiting mechanism.

FRIDA JADX IDA Burpsuite Android APK
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 16 hours ago · details