Leveraging the use of dynamic instrumentation for pentesting mobile apps

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
Not yet available
Language
English
Abstract
The session proposes a quick overview of Frida, a dynamic instrumentation framework, and how it can be used to enhance our work during the runtime analysis of a mobile application. It will be a walkthrough on how hooking and rewriting functions in runtime may be helpful against anti-reverse engineering measures and SSL pinning mechanisms.

No description available.

Talk ID
camp2023-57096
Event:
camp2023
Day
1
Room
Milliways
Start
2 p.m.
Duration
00:20:00
Track
Milliways
Type of
Short Talk
Speaker
tes
Talk Slug & media link
camp2023-57096-leveraging_the_use_of_dynamic_instrumentation_for_pentesting_mobile_apps

The video is not yet available