TransWikia.com

Attach Shared Object to android process with IDA

Reverse Engineering Asked by Frenchy Fry on March 25, 2021

I am:
working with an Android game,
using an Android Emulator,
and trying to attach an android .so library to a process.

I have the whole IDA server set up, I can attach to processes when a classes.dex is loaded into IDA but, when I load the .so file and try to attach I get this message from IDA “The debugger could not attach to the selected process. This can perhaps indicate the process was terminated, or you don’t have the necessary privileges.” I see a problem with this because I have full root permission and I know for sure the process was not terminated. I read here that I may have to recompile the entire android kernel, Don’t get me wrong I love wasting hours compiling but, I was just wondering if you guys can help me find something to solve this pesky little situation of mine.

Edit: This may be a dup but the dup wasn’t answered and was from 2014. :/

One Answer

If

cat /proc/kmsg | grep "Restricted"

returns results that are similar to ones in the blog you linked, then indeed CONFIG_SEC_RESTRICT_FORK is set and the only way to get rid of it is to recompile the kernel

Answered by Vitaly Osipov on March 25, 2021

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP