Difference between revisions of "CoursAndroid3"
From Fixme.ch
(→Description) |
(→Description) |
||
Line 5: | Line 5: | ||
* Date: 13.02.2014 at 19h until ~23h | * Date: 13.02.2014 at 19h until ~23h | ||
** Pick a date: http://framadate.org/studs.php?sondage=bow5dl3e8sptffo6 | ** Pick a date: http://framadate.org/studs.php?sondage=bow5dl3e8sptffo6 | ||
− | * Event: | + | * Event: https://fixme.ch/civicrm/event/info?reset=1&id=100 (Registration is mandatory!) |
* Virtualbox machine for the course: ftp://ftp.fixme.ch/free_for_all/VirtualMachines/android-reverse-fixme.tgz | * Virtualbox machine for the course: ftp://ftp.fixme.ch/free_for_all/VirtualMachines/android-reverse-fixme.tgz | ||
Revision as of 16:58, 28 January 2014
Description
- Third session of Android development class, focused on security/re.
- Date: 13.02.2014 at 19h until ~23h
- Event: https://fixme.ch/civicrm/event/info?reset=1&id=100 (Registration is mandatory!)
- Virtualbox machine for the course: ftp://ftp.fixme.ch/free_for_all/VirtualMachines/android-reverse-fixme.tgz
Content
- INTRO: Android stack, APK structure
- Static: Decompile, modify, repackage with apktool
- Dynamic: Modify library calls at run time with Android DDI
- ...
Resources
- VM for Android RE: https://redmine.honeynet.org/projects/are/wiki
- Android dis/assembler: https://code.google.com/p/smali/
- APK analysis: https://github.com/honeynet/apkinspector/
- Android vulnerable apps: https://github.com/jackMannino/OWASP-GoatDroid-Project
Project leader
Participants
- dgellow
- User:noskill