Thursday 4 October 14:00 - 15:30, Small talks
Axelle Apvrille (Fortinet)
This workshop explains how to reverse engineer Android malware. It consists of several guided labs where participants work on real malware within a virtual environment. The malicious samples are all recent - less than a year old.
After a quick tour of the basic skills and tricks to reverse engineer Android samples, the training covers the following topics:
PLEASE FOLLOW THE FOLLOWING INSTALLATION INSTRUCTIONS BEFORE THE LAB!
To test it:
1. docker run -d --name workshop-test -p 5022:22 -p 5900:5900 cryptax/android-re
2. If you use ssh: ssh -X -p 5022 firstname.lastname@example.org
If you use vncviewer: vncviewer 127.0.0.1::5900
The password is rootpass
3. In the Docker container, run: emulator7 &
Wait (may be long) to ensure the Android emulator opens up correctly
Jan Sirmer (Avast Software s.r.o)
Adolf Streda (Avast Software s.r.o)
Sayeed Abu-Nimeh (Seclytics)
Matthias Leisi (DNS Whitelist (DNSWL))