Once-the.rockets/are-up..who/cares-where.they/come-down.That's

N.O-T/MY-D/E.PA/R.T-ME-N/T.

2.9-C/3


Beginners Guide to Android Reverse Engineering
This workshop is a beginners guide to the first steps of self-defense by dismanteling apps and gaining inside their functions. It is aimed at hackers with some general knownledge about programming (understanding Java is better) and the use of command line tools.
Type: Hands-On
Person organizing User:sam
Orga contact sam@ccc.de


Starts at 2012/12/29 11:00:00 AM
Ends at 2012/12/29 01:00:00 PM
Duration 120 minutes
Location Hall 14
Add this event to your calendar (iCal)
#f79433

Android is a colorful platform for a variety of useful apps. But do you trust downloads from the Internet on a device carrying most of your personal data? Mobile malware has spread by side-loading or even by passing through Google Play. Does it send premium-SMS in the background? Or leak addressbook data to a remote server?

This workshop is a beginners guide to the first steps of self-defense by dismanteling apps and gaining inside their functions. It is aimed at hackers with some general knowledge about programming (understanding Java is better) and the use of command line tools.

After a short introduction about the approach and useful tools we should select some examples and have a deep look at least at one sample (the group's favorite).

To prepare, please download and install one of the following VMs:

You may bring your own apps, we might extract some of present devices or fetch some malware from well-known repositories (e.g. from Milas excellent collection at http://contagiodump.blogspot.de/).

--UPDATE--

Presentation slides

Archived page - Impressum/Datenschutz