Yasoob Khalid 7/5/2020

Reverse Engineering Nike Run Club Android App Using Frida

Read Original

This article details the author's journey of reverse engineering the Nike Run Club Android app using Frida. The goal was to extract authentication tokens for automated data export, as the app lacks a built-in feature. It covers bypassing initial traffic analysis with mitmproxy and provides a beginner-friendly tutorial on using Frida for dynamic instrumentation of the APK.

Reverse Engineering Nike Run Club Android App Using Frida

Comments

No comments yet

Be the first to share your thoughts!

Browser Extension

Get instant access to AllDevBlogs from your browser

Top of the Week

2
Designing Design Systems
TkDodo Dominik Dorfmeister 2 votes
4
Introducing RSC Explorer
Dan Abramov 1 votes
6
Fragments Dec 11
Martin Fowler 1 votes
7
Adding Type Hints to my Blog
Daniel Feldroy 1 votes
8
Refactoring English: Month 12
Michael Lynch 1 votes
10