Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets

Опубликовано: 21 Июнь 2024
на канале: Motasem Hamdan | Cyber Security & Tech
878
38

In this video walkthrough, we covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to decompile an android APK sample to uncover and extract any hardcoded and encrypted key values. We discovered that the app implements a function to employs an encryption routine to check whether the user's provided-input matches an encrypted value in order to decide whether to give perks or not. Frida is another tool that can be used to dynamically analyze a running Android app and if given the right process ID it may be able to recover encrypted values.
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
   / @motasemhamdan  
******
Writeup
https://motasem-notes.net/android-rev...
Frida Link
https://frida.re
********
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6ai...
LinkedIn
[1]:   / motasem-hamdan-7673289b  
[2]:   / motasem-eldad-ha-bb42481b2  
Instagram
  / motasem.hamdan.official  
Twitter
  / manmotasem  
Facebook
  / motasemhamdantty