Demonstrating printf or __android_log_print Vulnerabilities With Android NDK
问题 I am interested in demoing printf vulnerabilities via an NDK app. To be clear, I am aware that to log in the console we can use __android_log_print(ANDROID_LOG_DEBUG, "LOG_TAG", "Print : %d %s",someVal, someStr); . I have tried it and I know it works. But I explicitly want to demo the vulnerabilities of printf() , specifically to use the %n specifier to write to a pointed location. Is there a way to make printf() work to this effect or is it possible to achieve this via __android_log_print()