This module mainly focuses on static analysis of an Android application. It is split in two parts: the first one focuses on the static analysis of the java code, and the second one on the native code. During this module, you will learn how to find entry points from where one can perform further analyses from the Java code to the Native one. Different techniques and tools will be demonstrated so you can practice.
What you will learn:
A CrackMe-like challenge is provided as a practical exercise.
Different flags have to be found with only one condition: the trainee has to only perform static analysis to reverse engineer the application and retrieve those flags.
You will have to extract and decompile or disassemble the code to review it.
You will have to apply the tips that were provided while using Android Studio to review the code, especially, obfuscated ones.
Overall duration: 5 to 10 days
Schedule: 9:30am - 13pm (CET/CEST) - virtual/in person
Number of trainees: 2 trainees max.