Главная
Study mode:
on
1
Intro
2
WHY THE EVADE IN THE TITLE?
3
DON'T DO WORK FOR FREE
4
HUNTING IN BUG BOUNTIES IS A SKILL
5
APPLYING THIS TO MOBILE BOUNTIES
6
IDENTIFYING YOUR OBSTACLES
7
EVADING YOUR OBSTACLES
8
DON'T REINVENT THE WHEEL
9
PSEUDO DECRYPT
10
KONY GETS ANGRY...
11
ANGRY MEANS WE EVADE HARDER
12
VICTORY!
13
WHAT TO DO WITH THIS?
14
LESSON LEARNED?
15
OTHER BUG BOUNTY TLDRS
16
SOAPBOX
17
REFERENCES AND RESOURCES
18
GOOD LUCK HUNTING!
Description:
Learn techniques for quickly identifying and bypassing Android app protection schemes in this conference talk from LevelUp 2017. Discover methods to efficiently reverse engineer applications and overcome obstacles like packers, obfuscators, and anti-debugging measures. Gain practical skills to accelerate bug hunting and improve your return on investment in mobile bug bounty programs. Explore tools and strategies for penetrating the core of Android apps, allowing you to find vulnerabilities faster. Apply these insights to enhance your mobile security testing capabilities and increase your success in bug bounty hunting.

Identifying & Avoiding Android App Protections - Tim Strazzere, LevelUp 2017

Bugcrowd
Add to list
0:00 / 0:00