A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Vaccinating APK's - Milan Gabor GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

Vaccinating APK's
Milan Gabor
GrrCON 2014

Number of mobile applications is rising and Android still holds large market share. As these numbers of applications grow, we need better tools to understand how applications work and to analyze them. There is always a question if we can trust mobile applications to do only that that they are allowed to do and if they are really secure when transmitting our personal information to different servers. We will demonstrate, what can be found in mobile applications based on our experience. In the presentation some runtime techniques will be discussed and tool will be demonstrated. We will also be releasing and presenting tool can help developers to analyze runtime mobile Android applications and help them to look for different kind of vulnerabilities. Basic principle of this method is injecting small piece of code into APK and then connect to it and use Java Reflection to runtime modify value, call methods, instantiate classes and create own scripts to automate work. Tool is Java based and simple to use, but offers quite few new possibilities for security engineers and pentesters.

Back to GrrCON 2014 video list

Printable version of this article

15 most recent posts on Irongeek.com:

    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2019, IronGeek
    Louisville / Kentuckiana Information Security Enthusiast