Request a Demo Contact Us
Bugcrowd Achieves Global CREST Accreditation For Pen Testing
Learn More

Identifying & Avoiding Android App Protections

 

Bug bounties to me are always a race against time. Can we find a payable bug before we waste too much time? There are often specific things developers do to make reversing the applications more painful and take more time. In this presentation we will go over how to quickly identify many different protection schemes (Packers, Obfuscators, anti-techniques) and how to subvert them. Walking away from this presentation you should be armed with a treasure chest of techniques and tools to get to the gooey center of an Android application in no time. Hopefully this translates immediately to a higher ROI of your bug bounty hunting efforts.

More resources

Report

Inside the Mind of a Hacker

Read More
Datasheet

Crowdsourced Security in the Public Sector

Read More
Datasheet

Bugcrowd External Attack Surface Management (EASM)

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.