Dexcalibur - automate your android app reverse
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + coma | Decrease playback speed |
shift + dot or shift + semicolon | Increase playback speed |
end | Seek to end |
beginning | Seek to beginning |
Share this media
Information on this media
Creation date:
July 1st, 2019, 2:51 p.m.Add date:
July 1st, 2019, 3:13 p.m.Number of views:
132 (this month: 5)Speaker:
Georges-B. MichelLicense:
CC BY-SA v4Visibility:
This media is publishedDescription
Have you ever been worried about wasting time to make single-use hook in order to deobfuscate an Android app ? Instrumentation techniques often require prior static analysis or a known generic method, and a lot of code to read. Would you like to generate dozens of hooks, to gather the data and to sort it with a single click ? Dexcalibur is a new tool with a GUI and an API, built on top of several tools (Frida, Baksmali, LIEF, Capstone, Smali VM, …). It provides a way to explore a generated view of the application built from static analysis (of the flat files and intercepted files at runtime) and data gathered from several instrumentation sessions. The idea : reduce your reverse time, enhance your security analysis.
In this talk I will explain how Dexcalibur mixes static analysis, file analysis, and DBI in order to build a more complete view of the application.
Speaker
Georges-B. Michel
Bio
Georges is a software security engineer working at Thales. His passion is to develop new Android reverse engineering toolbox and to search for vulnerabilities. He loves (de)obfuscation, Android, TEE and browser exploitation.
Other media in the channel "2019"
795 views, 7 this monthPatrOwl - Orchestrating SecOps with an open-source SOAR platformJuly 3rd, 2019
121 viewsBetter curl !July 3rd, 2019
37 views, 2 this monthManaging a growing fleet of WiFi routers combining OpenWRT, WireGuard, Salt and ZabbixJuly 3rd, 2019
31 viewsNo IT security without Free SoftwareJuly 3rd, 2019
31 viewsD4 Project - Design and Implementation of an Open Source Distributed and Collaborative Security MonitoringJuly 3rd, 2019
11 viewsProgramming research, a missed opportunity for secure and libre software?July 3rd, 2019