YoVDO

Identifying & Avoiding Android App Protections - Tim Strazzere, LevelUp 2017

Offered By: Bugcrowd via YouTube

Tags

Penetration Testing Courses Packer Courses Mobile Security Courses Android Security Courses

Course Description

Overview

Learn techniques for quickly identifying and bypassing Android app protection schemes in this conference talk from LevelUp 2017. Discover methods to efficiently reverse engineer applications and overcome obstacles like packers, obfuscators, and anti-debugging measures. Gain practical skills to accelerate bug hunting and improve your return on investment in mobile bug bounty programs. Explore tools and strategies for penetrating the core of Android apps, allowing you to find vulnerabilities faster. Apply these insights to enhance your mobile security testing capabilities and increase your success in bug bounty hunting.

Syllabus

Intro
WHY THE EVADE IN THE TITLE?
DON'T DO WORK FOR FREE
HUNTING IN BUG BOUNTIES IS A SKILL
APPLYING THIS TO MOBILE BOUNTIES
IDENTIFYING YOUR OBSTACLES
EVADING YOUR OBSTACLES
DON'T REINVENT THE WHEEL
PSEUDO DECRYPT
KONY GETS ANGRY...
ANGRY MEANS WE EVADE HARDER
VICTORY!
WHAT TO DO WITH THIS?
LESSON LEARNED?
OTHER BUG BOUNTY TLDRS
SOAPBOX
REFERENCES AND RESOURCES
GOOD LUCK HUNTING!


Taught by

Bugcrowd

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent