73.gif

Search (advanced search)
Use this Search form before posting, asking or make a new thread.
Tips: Use Quotation mark to search words (eg. "How To Make Money Online")

02-10-2023, 12:08 PM
Post: #1
[F4LT] Learn To Reverse Engineer Android Tamper Detection
Learn To Reverse Engineer Android Tamper Detection
Learn how to implement and reverse engineer common tamper detection and attestation techniques
New
Rating: 5.0 out of 5
(1 rating)
289 students
32min of on-demand video

Description
This course was filmed as part of a workshop ran in January 2023.

By the end of this course you'll be able to develop simple Android applications, reverse Android applications to both Java and

SMALI, and apply other techniques to your reverse engineering efforts such as patching.

This course has a specific focus on understanding, utilising, and subverting tamper detection and attestation techniques. These techniques are used by banks, online games, and streaming services to minimise the potential of their applications running while on compromised (e.g. rooted) devices. A common and mainstream example of this is the Google Play SafetyNet Attestation API. During this course, we explain what attestation and tamper detection is, how it is used inside of Android applications, and how as reverse engineers we can get around these techniques for security testing.

This course also focuses on patching. This is the concept of statically altering an Android application before runtime to alter execution of the program. This can include anything from modifying variables, function calls, and classes. In this course we'll use patching to circumvent tamper detection and attestation techniques.

https://www.udemy.com/course/learn-to-reverse-engineer-android-tamper-detection/

Enjoy!




56.gif
Free counters!