Reverse Engineering of Android JNI Code
I am analyzing non-public API of some Android App. (I can tell you app name in message)
In this app, when POST request is sent, one hidden parameter is added to the HTTP header.
I have to find the algorithm which generates hidden parameter, because I want to use this app on my computer by sending POST request on my own code.
I reverse-compiled the app and found the code where to generate the hidden parameter.
The code calls JNI(Java Native Interface) and the parameter is calculated on JNI. (in .so, shared object file)
I have already identified the parameter which is inputted to JNI, and confirmed it.
( I created my project which calls the same JNI, and confirmed the result of JNI.)
I opened .so file on IDA tool, and the hidden parameter is like SHA256 hash, and I found some SALT is calculated during generating parameter, but I could not understand the whole of algorithm.
Just analyze the algorithm of generating hidden parameter, and write alternative code to generate parameter. Please write alternative code in any one of the following. C++/Python/Ruby/C# (C# is the best).
I can send you JNI (.so shared object) file, and my own Android app project which calls JNI.
If you are interested in my project, please feel free to contact to me. I can give you more details in message.
Hi I am very experienced in Reverse Engineering I already completed many projects similar as yours Please message me and send me .so file you need to analyse Thanks