У нас вы можете посмотреть бесплатно RPATH - run-time search path hard-coded in native library - hpAndro Vulnerable Application Challenge или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
🚩 CTF Link : http://ctf.hpandro.raviramesh.info ♚ All application on Playstore: https://play.google.com/store/apps/de... ♛ Consolidate challenges app: https://play.google.com/store/apps/de... 🔊 YouTube Channel: / androidappsec 🟦 Facebook Page: / hpandro1337 🔷Twitter handle : / hpandro1337 RPATH ====== CWE-426: Untrusted Search Path https://cwe.mitre.org/data/definition... The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control. This might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts. Some of the most common variants of untrusted search path are: 1. In various UNIX and Linux-based systems, the PATH environment variable may be consulted to locate executable programs, and LD_PRELOAD may be used to locate a separate library. 2. In various Microsoft-based systems, the PATH environment variable is consulted to locate a DLL, if the DLL is not found in other paths that appear earlier in the search order. =====Contents of this video===== 00:00 - Intro 00:11 - APK Download 00:56 - Find loaded library name in native code using jadx 02:38 - Extract .so files from APK file 04:43 - Check RPATH presence using checksec 06:00 - Get RPATH using IDA 07:06 - Get RPATH using xxd