Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Three Ways to Reverse Engineer Android Apps and Protection Methods

Philipp Lackner via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Dive into a 35-minute technical video exploring three distinct approaches attackers use to reverse engineer Android applications, followed by essential protection strategies. Learn about executing original code, implementing runtime hooks with Frida, and modifying and repackaging APK files. Starting with a practical sample app demonstration, discover how to identify vulnerabilities in Android applications and implement effective countermeasures. Explore hands-on examples using tools like JADX, with access to downloadable sample files for practice. Master both offensive and defensive aspects of Android app security, from understanding basic reverse engineering concepts to implementing robust protection mechanisms against potential threats.

Syllabus

00:00 - What is reverse engineering?
1:45 - The sample app we'll reverse engineer
4:04 - Approach 1: Executing original code
12:28 - Approach 2: Runtime hooks with Frida
19:38 - Approach 3: Change & repackage the APK
28:38 - Protecting against reverse engineering

Taught by

Philipp Lackner

Reviews

Start your review of Three Ways to Reverse Engineer Android Apps and Protection Methods

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.