null Global Committee elections are coming up! See the election repository for more information.

Abstract

Understanding usage of tools like APKTool, D2J, JDGui, Jadx, APKSiger for Reverse engineering Android apk as part of static code analysis. If time permits HTTP/HTTPS interception using burp proxy.

Pre-requisites:
Windows/Mac/Linux machine with
- Admin rights
- USB access
- Sufficient free disk space & RAM
- Java installed
- ADB (You can download standalone or Android Studio also contains ADB)
- APKTool (https://ibotpeaches.github.io/Apktool/install/)
- D2J (https://sourceforge.net/projects/dex2jar/files/latest/download)
- JDGUI (http://jd.benow.ca/)
- Jadx (https://bintray.com/skylot/jadx/downloadfile?filepath=jadx-0.7.1.zip)
- apksigner (https://play.google.com/store/apps/details?id=com.haibison.apksigner&hl=en_IN)
(If you don't have android phone to download you can skip apksigner)
- Burp (https://portswigger.net/burp/communitydownload)

Speaker

Kartik Lalan

Timing

Starts at Saturday August 18 2018, 03:00 PM. The sessions runs for about 3 hours.

Resources