Reverse engineering (RE) is a skill that represents foundational work that our favorite forensic tools are built upon. But when you as an examiner encounter an app that isn’t supported anywhere, what recourse do you have? Join Chris Atha (NW3C) and Mike Williamson (Magnet Forensics) for an introduction to the fascinating, ever-changing world of RE. After an overview of basic RE concepts, challenges, and potential use-cases for forensic examiners, participants will dive in to manipulating live Android apps using Frida, a popular open source toolkit for dynamic binary instrumentation (DBI). No prior programming knowledge required – we will walk you through the process. Just how easy is that vault passcode to bypass? Join us and find out!
If you enjoy this session, we’re hosting a follow-up Q&A session with Mike Williamson, Chris Atha and Chris McKnight, see details below:
Mobile Reverse Engineering Hangout Session
Tuesday, June 9, 2020 – 10:00AM – 11:00AM ET