WiCyS Silicon Valley x Google Android App Hacking Workshop


Details
Join Women in Cybersecurity (WiCyS) Silicon Valley and Google’s Women & Allies in Cybersecurity to learn about Android security and reverse engineering!
We'll kick off with a bit of Q&A. Then you'll get hands-on in of two Android App Hacking workshops led by Google Security Engineers. Previous experience NOT required! Laptops will be provided.
How to RSVP
Complete all of the following:
- Register on Eventbrite - https://www.eventbrite.com/e/wicys-x-google-android-app-hacking-workshop-tickets-88187622553
- Fill out the RSVP form - https://tinyurl.com/suozs2c
- Receive email confirming your seat in a workshop. Location details will be provided.
Important notes
*** You must get a ticket in Eventbrite AND fill out the RSVP form. ***
*** Your spot in a workshop will be CONFIRMED BY EMAIL. You must show email confirmation to participate in the workshop. ***
After the first 25 RSVPs, you will be placed on a waitlist. You can still attend the initial Q&A session and networking as waitlist guest.
For additional info or questions, send an email to wicyssiliconvalley@wicys.org.
Workshops Details
Android App Hacking 101
Our 'Android App Hacking 101' is designed for attendees with no coding experience. In this course, you will learn how to write a simple Android app, run it in an emulator, and reverse engineer it. This course will provide the foundational elements required to learn more about Android application security in only one hour!
-Learn the anatomy of an Android package.
-Learn how to write a simple Android application.
-Learn some basics for analyzing an Android application, including:
--how to use Android Studio to run an application
--how to disassemble and decompile an application
--how to use WireShark to look into the application's traffic
--more as time allows!
Advanced Android App Hacking
This workshop is designed for attendees with prior computer science knowledge. In this hour-long course, you will learn how to statically and dynamically analyze Android applications. You will then apply this learning in order to find Easter eggs (aka flags) in applications specifically crafted for this course.
-Learn to setup a testing lab that's easy to reproduce at home.
-Learn how to statically and dynamically analyze Android Applications with Open Source tools, including learning:
--the anatomy of an APK, and what file you should focus on
--static analysis with disassemblers and decompilers (apktool, Jadx, Bytecode Viewer)
--dynamic analysiszwith a code instrumentation framework (Frida)
--network capturing with tcpdump
--network Man-In-The-Middle technique (BurpSuite, MiTMProxy).

WiCyS Silicon Valley x Google Android App Hacking Workshop