Darioincalza attackingandroidapplications cover

Attacking Android Applications

If you enjoy talks from 360 AnDev, please support the conference via Patreon!

Get more development news like this

In this talk we aim at showing how easy it is to reverse engineer an Android application. We show how to perform static analysis on an application. Secondly, we illustrate how applications are attacked dynamically in order to investigate or alter the program flow of the application. Attendees walk away with tools and information to perform basic pentesting techniques on their own applications.

Next Up: Android Architecture Components and Realm

General link arrow white

About the content

This talk was delivered live in July 2017 at 360 AnDev. The video was recorded, produced, and transcribed by Realm, and is published here with the permission of the conference organizers.

Dario Incalza

Dario is a senior IT security consultant at EY FSO Belgium, where he performs security assessments of mobile applications and their backends on architectural and implementation level. He coaches juniors in his team in pentesting of web and mobile applications. He graduated as a M. Sc. Computer Science specialised in Development of Secure Software at KU Leuven. When he is not talking or working on mobile and web security at EY, he enjoys bug bounty hunting and creating open source reverse engineering tools.

4 design patterns for a RESTless mobile integration »