YoVDO

B(l)utter - Reversing Flutter Applications - HITB2023HKT COMMSEC Day 2

Offered By: Hack In The Box Security Conference via YouTube

Tags

Reverse Engineering Courses Dart Courses Flutter Courses Mobile Security Courses Exploit Development Courses Vulnerability Research Courses Frida Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for reverse engineering Flutter applications in this comprehensive conference talk. Delve into the challenges of reading Dart snapshots and learn about a new methodology that leverages Dart runtime source code directly. Discover how this approach reduces compiling time and enables metadata extraction without launching Flutter applications. Gain insights into the types of information obtainable and their applications in the reverse engineering process. Get introduced to B(l)utter, an open-source tool that demonstrates this new approach, capable of automatically extracting metadata from Dart snapshots, analyzing compiled code, and generating Frida functions for hooking and data dumping in running Flutter applications. Presented by Worawit Wangwarunyoo, a security researcher specializing in Windows and Linux exploitation, this talk offers valuable knowledge for those interested in vulnerability research, exploit development, and reverse engineering.

Syllabus

#HITB2023HKT #COMMSEC D2 - B(l)utter – Reversing Flutter Applications - Worawit Wangwarunyoo


Taught by

Hack In The Box Security Conference

Related Courses

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Cyber Mentor via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
macOS Security Features Bypasses by Example
nullcon via YouTube
Exploiting Android Messengers with WebRTC
nullcon via YouTube
XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube