Mastering Android Application Reverse Engineering
APK Static Analysis
By the end of this course you’ll be able to develop simple Android applications, reverse Android applications to both Java and SMALI, and apply other techniques to your reverse engineering efforts such as patching.
Patching Android Applications and SMALI
This course also focuses on patching. This is the concept of statically altering an Android application before runtime to alter execution of the program. This can include anything from modifying variables, function calls, and classes. In this course we’ll use patching to circumvent tamper detection and attestation techniques.
Android Tamper Detection and Attestation Techniques
This course has a specific focus on understanding, utilizing, and subverting tamper detection and attestation techniques. These techniques are used by banks, online games, and streaming services to minimize the potential of their applications running while on compromised (e.g. rooted) devices.
Who Is this Workshop for
- People interested in developing their skills in Android application reverse engineering.
- People interested in learning more about Android application tamper protection and attestation.
- People new to patching Android applications using SMALI.
Find helpful resources for completing the workshop below alongside recordings, workbooks, and code snippets useful for the workshop.
If you missed a part of the workshop or want to double back on a part you need more practice on or found interesting you can find a past recording on Udemy here.
Runic Java Application Demo
An Android application, designed to serve as a parallel for understanding more complex tamper detection and integrity systems such as Google Play SafetyNet and Huawei Safety Detect.