Chapter 8. Native Exploitation and Analysis

In this chapter, we will cover the following recipes:

  • Inspecting file permissions
  • Cross-compiling native executables
  • Exploitation of race condition vulnerabilities
  • Stack memory corruption exploitation
  • Automated native Android fuzzing

Introduction

So far we've covered most of the high-level aspects of applications on the Android platform; this chapter focuses on the some of the native aspects—everything supporting the application layer components. The native aspects include the system daemons, the binary executables—compiled specifically for the system architecture—and the components of the filesystem and device-level configurations. Any of these aspects of the Android system may cause security vulnerabilities ...

Get Android Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.