Getting Familiar With Android pen-test Tools null Ahmedabad Public Puliya 18 August 2018 Getting Familiar With Android PenTesting Tools
Abstract
Understanding usage of tools like APKTool, D2J, JDGui, Jadx, APKSiger for Reverse engineering Android apk as part of static code analysis. If time permits HTTP/HTTPS interception using burp proxy.
Pre-requisites:
Windows/Mac/Linux machine with
- Admin rights
- USB access
- Sufficient free disk space & RAM
- Java installed
- ADB (You can download standalone or Android Studio also contains ADB)
- APKTool (https://ibotpeaches.github.io/Apktool/install/)
- D2J (https://sourceforge.net/projects/dex2jar/files/latest/download)
- JDGUI (http://jd.benow.ca/)
- Jadx (https://bintray.com/skylot/jadx/downloadfile?filepath=jadx-0.7.1.zip)
- apksigner (https://play.google.com/store/apps/details?id=com.haibison.apksigner&hl=en_IN)
(If you don't have android phone to download you can skip apksigner)
- Burp (https://portswigger.net/burp/communitydownload)
Speaker
Timing
Starts at Saturday August 18 2018, 03:00 PM. The sessions runs for about 3 hours.