B(l)utter - Reversing Flutter Applications - HITB2023HKT COMMSEC Day 2
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore advanced techniques for reverse engineering Flutter applications in this comprehensive conference talk. Delve into the challenges of reading Dart snapshots and learn about a new methodology that leverages Dart runtime source code directly. Discover how this approach reduces compiling time and enables metadata extraction without launching Flutter applications. Gain insights into the types of information obtainable and their applications in the reverse engineering process. Get introduced to B(l)utter, an open-source tool that demonstrates this new approach, capable of automatically extracting metadata from Dart snapshots, analyzing compiled code, and generating Frida functions for hooking and data dumping in running Flutter applications. Presented by Worawit Wangwarunyoo, a security researcher specializing in Windows and Linux exploitation, this talk offers valuable knowledge for those interested in vulnerability research, exploit development, and reverse engineering.
Syllabus
#HITB2023HKT #COMMSEC D2 - B(l)utter – Reversing Flutter Applications - Worawit Wangwarunyoo
Taught by
Hack In The Box Security Conference
Related Courses
Ethical Hacking in 15 Hours - 2023 Edition - Learn to HackCyber Mentor via YouTube Contextomy - Let's Debug Together
nullcon via YouTube macOS Security Features Bypasses by Example
nullcon via YouTube Exploiting Android Messengers with WebRTC
nullcon via YouTube XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube