Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
AppSecUSA 2015 - Buy ticket at http://2015.appsecusa.org/buy/
 
View analytic
Friday, September 25 • 3:00pm - 3:55pm
Oh Yes, There is no more root detection for your Android App! - Reversing & Patching Binary”

Sign up or log in to save this to your schedule and see who's attending!

Lab material available for download here: 
https://drive.google.com/folderview?id=0Bwov3aDFEjiETzBmTl9udlM1RU0&usp=sharing
Please download before arriving at the conference!

Android is the leading Operating system. It is used not just in Smartphones / Tablet but also is used as base for interactive Television, gaming console and lot more systems. The obvious resultant is that there is a large focus towards developing applications for this platform and to maintain its security. This is one hour crash course on “By passing root detection” on android based dummy internet banking app, This dummy internet banking application has features such as adding a beneficiary account, fund transfer, view statements, OTP, Pin sign-in, etc. to provide attendees a real world application scenario.

Android APK file architecture and Setting up the emulator.
Reversing the APK file package
Understanding, patching smali code (JAVA – Class – Dex – smali – APK)
Bypass the business logic for the root detection

Who Should Attend
- Security Professionals
- Mobile Application Developers
- People interested to start into Android security
- Web Application Pentesters
- Beginners mobile app malware auditor

What to expect :
- Getting started with Android Security
- Reversing and Auditing of Android applications
- Hands-on on Finding vulnerabilities and patching the binary

Speakers
avatar for Abhinav Sejpal

Abhinav Sejpal

Security Researcher, Accenture Digital
Fell in love with the power of software at age 17, and he is still in love. Assists organisations,Stakeholders & Customers in achieving real risk reduction by ensuring that they have the people, technologies, and processes in place to enable business operations while preventing, detecting, and responding to attacks by sophisticated cyber adversaries. Deeply skilled in Security Vision, Leadership & Pen-testing. | | He has reported... Read More →


Friday September 25, 2015 3:00pm - 3:55pm
Room E