Bypassing Android Binary Protections


Details
If you want to learn how to bypass Android binary protections such as SSL pinning and root detection then this meetup is definitely for you! Pizza, beer and soft drinks will be provided.
Please RSVP if you can make it.
Agenda
- Socialising - 6:00pm - 6:30pm
- Presentation - 6:30pm - 7:30pm
- Socialising - 7:30pm onwards
Presentation
Android developers can add binary protections (SSL pinning, root detection, etc) into their mobile applications for several reasons. However the biggest motivation to do so is to make it harder for attacks to reverse engineer and analyse the application for vulnerabilities. This presentation covers a little about how Android works under the hood, the different types of binary protections, why we need them and methods for bypassing the most common protections put in place by developers.
About the speaker
Julian Berton (@JulianBerton)
With a background in software development, Julian spent several years working on web development projects some of which have had security as their main goal. He has since pursued his passion for information security where he is now employed as an application security tester.
Julian is a chapter lead of the OWASP Melbourne chapter where he volunteers his time to organise presentations and run practical security workshops. He also regularly gives application security related presentations aimed to education developers and the wider security community. A few recent presentations have been at WAHCKon, ASIA, OWASP Melbourne and Node.js meetups.
Access
If you are locked out or having issues finding the place, call us and we will guide you :)
- Serge (serg [at] owasp [dot] org) 0401 533 999
- Julian (julian [dot] berton [at] owasp [dot]] org) 0400 023 069
Sponsor

Bypassing Android Binary Protections