HackDig : Dig high-quality web security articles

Dynamically inject a shared library into a running process on Android/ARM

If you're familiar with Windows runtime code injection you probably know the great API CreateRemoteThread which lets us force an arbitrary running process to call LoadLibrary and load a DLL into its address space, this technique called DLL Injection is often used to perform user space API hooking, you can find a good post about it on Gianluca Braga's blog.
Publish At:2015-05-02 05:45 | Read:7393 | Comments:0 | Tags:hooking api hooking library android injection ptrace remote

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud