Participants learn how to analyze Android malware.
The majority of sessions consist of hands-on labs, with exercises on recent Android samples we caught. We focus on **typical questions for malware analysts**:
Participants learn to use famous tools such as Apktool / Smali / Baksmali / JADX. Yet, one of **the originality of this training is the introduction to "modern" advanced tools such as Dexcalibur, House or Quark**.
Training level: Intermediate
Day 1: Reverse engineering of Android Malware - Getting started
Day 2: Dynamic load and obfuscation
Day 3: Network activity and native libraries
(the outline may vary a little - for instance, depending on what the audience wishes!)
What to bring
Please install the following on your laptop and ensure you have a few GB of disk space left.
Who should attend?
What to expect?
At the end of this training, you will be able to reverse Android malware on your own.
What attendees will get
What not to expect?
Axelle Apvrille is a happy senior researcher at Fortinet, where she hunts down any strange virus on so-called 'smart devices (smartphones, IoT). She is a frequent speaker at several conferences (Virus Bulletin, Insomnihack...), and has also given several workshops (Hack.lu, NorthSec...).
She is also the lead organizer of Ph0wn CTF, a CTF located in France and dedicated to security challenges on IoT.