Attacking the JNI Boundary with Frida
Tags
cmtmf-attack-pattern: | Native Code |
attack-pattern: | Data Credentials - T1589.001 Tool - T1588.002 |
Common Information
Type | Value |
---|---|
UUID | af44b0be-2171-4038-bfab-a0deee1a5bea |
Fingerprint | 2e55a901695532ff |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 11, 2020, noon |
Added to db | Oct. 23, 2023, 12:11 a.m. |
Last updated | Nov. 18, 2024, 2:36 a.m. |
Headline | UNKNOWN |
Title | Attacking the JNI Boundary with Frida |
Detected Hints/Tags/Attributes | 35/2/12 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 346 | ✔ | Optiv Blog | https://www.optiv.com/resources/blog/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 4 | libnative-lib.so |
|
Details | Domain | 10 | mainactivity.java |
|
Details | Domain | 6 | www.frida.re |
|
Details | Domain | 72 | optiv.com |
|
Details | 65 | legal@optiv.com |
||
Details | File | 3 | com.opt |
|
Details | File | 1 | iv.nd |
|
Details | File | 1 | kcrackme.apk |
|
Details | File | 10 | mainactivity.java |
|
Details | File | 365 | console.log |
|
Details | File | 1 | frida.js |
|
Details | Url | 3 | https://www.frida.re/docs/home |