E²VA: Stack Buffer Overflow Module (Part 3)
Exploitation of EasyStackBufferOverflowModule
This article describes exploitation of the EasyStackBufferOverflowModule. During exploitation, various Android - specific caveats are discussed.
Assumptions
We will assume that we have successfully grabbed a copy of the .apk
file of damnvulnerableapp. Also, we will not discuss how to unpack an .apk
file, but rather assume that we have access to libEasyStackBufferOverflowModule.so
and the EasyStackBufferOverflowModule
class. If it is unclear how to get access to these components when only given an .apk
file, read the previous blog posts first!
9 minutes to read
Pascal Kühnemann