Hacking the Android APK - WebEx ONLY!
Details
The link for the WebEx is https://meetings.webex.com/collabs/#/meetings/detail?uuid=M9Z0WQE821KV3T5IO4Z4AV9BHP-JMV3&rnd=372343.41580
Be sure you have signed into the Meetup in order to get your CEs. https://meetup.intellectualpoint.com This link will close on the 13th and you will no longer be able to get your CEs so be sure to log in now!
______________________________________________________________________________
We are very excited about the Hacking the Android APK Meetup. We are going to try something different this time. We are going to do our Digital Natives Meetup on WebEx ONLY. So be sure to join us on WebEx, not in the office.
All WebEx participants will need to download and install the latest versions of Android Studio (https://developer.android.com/studio/#downloads) and Burp Suite (https://portswigger.net/burp/communitydownload) beforehand. 8GB RAM minimum is recommended.
In order to get onto the WebEx, you need to first login on the Meetup website https://meetup.intellectualpoint.com. Once you do that you will get an invite to the WebEx.
Be sure you have signed into the Meetup in order to get your CEs. https://meetup.intellectualpoint.com This link will close on the 13th and you will no longer be able to get your CEs so be sure to log in now!
__________________________________________________________________________________
This hands-on meetup will walk participants through a brief overview of the basics of Android application testing and APK reversing. The tools and techniques imparted in this meetup will introduce participants to APK analysis, mobile threat research, and mobile application penetration testing. Free and open-source tools will be emphasized while recognizing the potential role of commercial tools in static and dynamic analysis of APKs.
Required Materials: Students will need to bring their own Windows/Linux/macOS laptop with 8+ GB RAM, WiFi, USB, and VirtualBox or VMware installed. A VM will be made available to attendees for download before class.
A blog post from Polito, Inc. highlighting a real-life case of testing Android applications for security: https://www.politoinc.com/single-post/2015/05/24/Analysis-and-Modification-of-Android-Apps
About the Instructor
Ben brings a diverse background in cybersecurity, IT, law, and law enforcement to Polito. After earning his JD from William & Mary School of Law in 2010 and providing IT and e-discovery support to law firms, Ben joined Booz Allen Hamilton as a cybersecurity consultant in 2012. While a member of Advanced Persistent Threat (APT) hunt teams assigned to commercial and federal clients, Ben sharpened his network security monitoring, forensics, incident response, malware analysis, cyber threat intelligence, and security architecture skills. He has earned the CISSP, GIAC Certified Forensic Analyst (GCFA), GIAC Web Application Penetration Tester (GWAPT), and Splunk Certified Power User certifications. Ben is a member of the Maryland bar and volunteers at a pro bono legal clinic.

