Recently I devised a way to avoid obfuscation of a jar file, here is how it works:
- Renamed the
abc.jarfile toxyz.so - Placed it in system folder something like
/lib/bdevid/where other.sofiles were also present - Modified the Operations And Management script (which used to restart the jar in case of any crash, both manually and automatically) to copy it from
/lib/bdevid/xyz.soand place it where it was supposed to be, restart it and then delete the jar file, after a delay of 1 to 2 seconds.
The operations and management script is on a remote machine so access to this script is restricted, only web access is permitted.
What are possible loopholes in this process?
Please note that this process is currently running successfully, I just want to know how secure is this.
file(which looks at file headers) onxyz.sowould quickly see it is a jar file and not a shared library (.so); e.g.,file xyz.sowould givexyz.so: Java Jar file data (zip). – dr jimbob May 20 '16 at 06:09