Beginners Guide to Android Reverse Engineering
|Beginners Guide to Android Reverse Engineering|
|This workshop is a beginners guide to the first steps of self-defense by dismanteling apps and gaining inside their functions. It is aimed at hackers with some general knownledge about programming (understanding Java is better) and the use of command line tools.|
|Starts at||2012/12/29 11:00:00 AM|
|Ends at||2012/12/29 01:00:00 PM|
|Add this event to your calendar (iCal)|
Android is a colorful platform for a variety of useful apps. But do you trust downloads from the Internet on a device carrying most of your personal data? Mobile malware has spread by side-loading or even by passing through Google Play. Does it send premium-SMS in the background? Or leak addressbook data to a remote server?
This workshop is a beginners guide to the first steps of self-defense by dismanteling apps and gaining inside their functions. It is aimed at hackers with some general knowledge about programming (understanding Java is better) and the use of command line tools.
After a short introduction about the approach and useful tools we should select some examples and have a deep look at least at one sample (the group's favorite).
To prepare, please download and install one of the following VMs:
- A.R.E - Android Reverse Engineering VM (4,6GB compressed) at https://redmine.honeynet.org/projects/are/wiki and make an update via git from within.
- Santoku Linux ISO (1,2GB) at https://santoku-linux.com/download , currently v0.3
You may bring your own apps, we might extract some of present devices or fetch some malware from well-known repositories (e.g. from Milas excellent collection at http://contagiodump.blogspot.de/).