Analyzing Android Malware Workshop: Difference between revisions
No edit summary |
No edit summary |
||
(5 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
= Analyzing Android Malware; from triage to reverse engineering workshop = | = Analyzing Android Malware; from triage to reverse engineering workshop = | ||
This workshop will be given | This workshop will be given:<br> | ||
Day 2: Saturday, 23-July, 7:00pm - 11:00pm, in Workshop B (D'Angelo 306)<br> | Day 2: Saturday, 23-July, 7:00pm - 11:00pm, in Workshop B (D'Angelo 306)<br> | ||
<br> | <br> | ||
Line 9: | Line 9: | ||
== Abstract == | == Abstract == | ||
Android malware has become prevalent across the landscape. In this workshop Vitor Ventura will provide hands-on reverse engineering techniques for Android malware. This workshop is designed to provide the participants with different approaches to malware analysis, so that they can perform their own analysis without the use of automated tools. When everything else fails, knowing how the tools work under the hood provides the necessary knowledge to bypass the problems encountered. The attendees will learn, by doing it themselves, how to bypass the most common techniques used by malware to prevent analysis. The objective is that the attendees understand how they can use techniques like instrumentation and patching to help them analyze and bypass malware defenses when the automated tools fail, while using only free and open source tools. | |||
== Presenter(s) == | == Presenter(s) == | ||
Vitor Ventura | |||
== Full Description == | == Full Description == | ||
full | This is a full hands-on workshop you will applying techniques to bypass the most common malware protection techniques, using frida and doing static analysis. | ||
Line 25: | Line 25: | ||
== Required Software == | == Required Software == | ||
any required | This is a hands on workshop, as such a VM was created to make it easier for people to participate. </br> | ||
The VM can be downloaded here: http://cs.co/AndroidAnalysisVM </br> | |||
</br> | |||
If you downloaded it and want to play with it in advanced the password is: password | |||
</br> | |||
It is strongly advised to use VMware to run the VM, you can download VMware from their site. </br> | |||
VirtualBox may work but it was not tested, use at your own risk. </br> | |||
== What Participants Should Bring to the Workshop (if anything) == | |||
any optional or required stuff to bring go here | |||
== Links == | == Links == | ||
http://cs.co/AndroidAnalysisVM - VM |
Latest revision as of 11:33, 22 July 2022
Analyzing Android Malware; from triage to reverse engineering workshop
This workshop will be given:
Day 2: Saturday, 23-July, 7:00pm - 11:00pm, in Workshop B (D'Angelo 306)
NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop B (D'Angelo 306).
Abstract
Android malware has become prevalent across the landscape. In this workshop Vitor Ventura will provide hands-on reverse engineering techniques for Android malware. This workshop is designed to provide the participants with different approaches to malware analysis, so that they can perform their own analysis without the use of automated tools. When everything else fails, knowing how the tools work under the hood provides the necessary knowledge to bypass the problems encountered. The attendees will learn, by doing it themselves, how to bypass the most common techniques used by malware to prevent analysis. The objective is that the attendees understand how they can use techniques like instrumentation and patching to help them analyze and bypass malware defenses when the automated tools fail, while using only free and open source tools.
Presenter(s)
Vitor Ventura
Full Description
This is a full hands-on workshop you will applying techniques to bypass the most common malware protection techniques, using frida and doing static analysis.
Registration -- NOT required
You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:
Required Software
This is a hands on workshop, as such a VM was created to make it easier for people to participate.
The VM can be downloaded here: http://cs.co/AndroidAnalysisVM
If you downloaded it and want to play with it in advanced the password is: password
It is strongly advised to use VMware to run the VM, you can download VMware from their site.
VirtualBox may work but it was not tested, use at your own risk.
What Participants Should Bring to the Workshop (if anything)
any optional or required stuff to bring go here