Dexcalibur - automate your android app reverse
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + comma | Decrease playback rate |
shift + dot or shift + semicolon | Increase playback rate |
end | Seek to end |
beginning | Seek to beginning |
Share this media
HLS video stream
You can use an external player to play this stream (like VLC).
HLS video streamInformation on this media
Links:
Number of views:
220 (this month: 5)Creation date:
July 1, 2019Speakers:
Georges-B. MichelLicense:
CC BY-SA v4Description
Have you ever been worried about wasting time to make single-use hook in order to deobfuscate an Android app ? Instrumentation techniques often require prior static analysis or a known generic method, and a lot of code to read. Would you like to generate dozens of hooks, to gather the data and to sort it with a single click ? Dexcalibur is a new tool with a GUI and an API, built on top of several tools (Frida, Baksmali, LIEF, Capstone, Smali VM, …). It provides a way to explore a generated view of the application built from static analysis (of the flat files and intercepted files at runtime) and data gathered from several instrumentation sessions. The idea : reduce your reverse time, enhance your security analysis.
In this talk I will explain how Dexcalibur mixes static analysis, file analysis, and DBI in order to build a more complete view of the application.
Speaker
Georges-B. Michel
Bio
Georges is a software security engineer working at Thales. His passion is to develop new Android reverse engineering toolbox and to search for vulnerabilities. He loves (de)obfuscation, Android, TEE and browser exploitation.
Other media in the channel "2019"
981 views, 1 this monthPatrOwl - Orchestrating SecOps with an open-source SOAR platformJuly 3rd, 2019
136 views, 1 this monthBetter curl !July 3rd, 2019
101 views, 2 this monthManaging a growing fleet of WiFi routers combining OpenWRT, WireGuard, Salt and ZabbixJuly 3rd, 2019
32 viewsNo IT security without Free SoftwareJuly 3rd, 2019
33 views, 1 this monthD4 Project - Design and Implementation of an Open Source Distributed and Collaborative Security MonitoringJuly 3rd, 2019
15 viewsProgramming research, a missed opportunity for secure and libre software?July 3rd, 2019