Skip to content

This contains notes and slides for my talk on Reverse Engineering Android Malware

Notifications You must be signed in to change notification settings

LaurieWired/ReverseEngineeringAndroidMalware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

logo


GitHub stars GitHub forks GitHub contributors Follow @lauriewired on Twitter


Reverse Engineering Android Malware 🤖

During this talk, I introduce the flow of malware analysis from the discovery to the reverse engineering phase. I show how to reverse engineer malicious Android applications and even look at a case study of the notorious SpyNote malware. Together we locate the malicious C2 server hidden inside of the Android application's resources.

Bonus Challenge 🔍

⚠️ Caution, this is real malware ⚠️

Can you find the malicious C2 server inside this similar SpyNote sample?

Hint! It may be encoded

About

This contains notes and slides for my talk on Reverse Engineering Android Malware

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published