When Frida plays in the blue team
Let’s see how to protect a vulnerable binary against stack buffer overflow attacks through dynamic instrumentation.
Let’s see how to protect a vulnerable binary against stack buffer overflow attacks through dynamic instrumentation.
In this article we will see how a native library can be abused to inject code and capture the PIN code from an Android application, without triggering the protections. All without doing reverse engineering.