Description
- Third session of Android development class, focused on security/re.
- Date: 13.02.2014 at 19h until ~23h
- Event: https://fixme.ch/civicrm/event/info?reset=1&id=100 (Registration is mandatory!)
- Virtualbox machine for the course: ftp://ftp.fixme.ch/free_for_all/VirtualMachines/android-reverse-fixme.tgz
Content
- INTRO: Android stack, APK structure
- Static: Decompile, modify, repackage with apktool
- Dynamic: Modify library calls at run time with Android DDI
- ...
Resources
- VM for Android RE: https://redmine.honeynet.org/projects/are/wiki
- Android dis/assembler: https://code.google.com/p/smali/
- APK analysis: https://github.com/honeynet/apkinspector/
- Android vulnerable apps: https://github.com/jackMannino/OWASP-GoatDroid-Project
Project leader
Participants
- dgellow
- User:noskill