Главная
Study mode:
on
1
Introduction
2
Overview
3
Sensitive Data
4
IExplore
5
HTTPS
6
Proxy Server
7
Credit Card
8
Packet Capture
9
Detour
10
Jailbreaking
11
Jailbreak Applications
12
Keychain Security
13
Application Binary
14
snoopit
15
snippet
16
extract implementation details
17
classdump
18
dynamic analysis
19
usage
20
tool summary
21
Android package files
22
What is this
23
Storage Secure
24
Debug Bridge
25
Download Files
26
File Command
27
Strings Command
28
Les Command
29
Access Restricted Files
30
Edit a Request
31
Get a Response
32
Result
33
Results
34
Dexta Jar
35
Get App Off Device
36
Verify App
37
Invoke Dexta
38
Launch JD GUI
39
View Source Code
40
Is Encryption Strong
41
Java Debug Wire
42
Summary
43
Questions
Description:
Dive into mobile application reverse engineering with this comprehensive 48-minute conference talk from Derbycon 2015. Explore various techniques and tools for analyzing mobile apps, including sensitive data handling, HTTPS proxying, packet capture, and jailbreaking. Learn about iOS-specific methods like Keychain security analysis, binary exploration with tools such as snippetextract and classdump, and dynamic analysis techniques. Discover Android-specific approaches, including package file analysis, secure storage examination, and using the Android Debug Bridge. Master essential commands for file manipulation, string extraction, and accessing restricted files. Gain insights into decompiling and viewing source code, assessing encryption strength, and utilizing Java Debug Wire. Enhance your mobile app security knowledge through this in-depth exploration of reverse engineering methodologies.

Mobile Application Reverse Engineering Under the Hood

Add to list
0:00 / 0:00