Abstract

Understanding usage of tools like APKTool, D2J, JDGui, Jadx, APKSiger for Reverse engineering Android apk as part of static code analysis. If time permits HTTP/HTTPS interception using burp proxy.

Pre-requisites:
Windows/Mac/Linux machine with
- Admin rights
- USB access
- Sufficient free disk space & RAM
- Java installed
- ADB (You can download standalone or Android Studio also contains ADB)
- APKTool (https://ibotpeaches.github.io/Apktool/install/)
- D2J (https://sourceforge.net/projects/dex2jar/files/latest/download)
- JDGUI (http://jd.benow.ca/)
- Jadx (https://bintray.com/skylot/jadx/downloadfile?filepath=jadx-0.7.1.zip)
- apksigner (https://play.google.com/store/apps/details?id=com.haibison.apksigner&hl=en_IN)
(If you don't have android phone to download you can skip apksigner)
- Burp (https://portswigger.net/burp/communitydownload)

Speaker

Kartik Lalan

Timing

Starts at Saturday August 18 2018, 03:00 PM. The sessions runs for about 3 hours.

Resources