Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced mobile application exploitation techniques in this 40-minute conference talk that demonstrates how game cheating methods can be repurposed to compromise Android applications. Learn how DLL injection and function hooking within the Mono Runtime—commonly used in Unity-based games—can be adapted to exploit critical functionalities in mobile apps. Discover how attackers can alter execution flows, access protected resources, and manipulate sensitive data using methodologies that differ from conventional Android app reverse engineering approaches. Examine the implementation of these techniques through detailed research findings, explore scenarios involving the bypass of protection mechanisms, and witness a live demonstration of an attack against a popular password manager application available on the Google Play Store. Gain insights from Bruno Sena, a Brazilian cybersecurity professional specializing in offensive security and mobile hacking, who serves as founder of the MobSec Crew community and organizer of Mobile Security Villages at major security conferences.