6 Questions
What is the purpose of reverse engineering Android apps?
All of the above
Which file in an APK contains the Android app's manifest information?
AndroidManifest.xml
What does the acronym DEX stand for in Android app development?
Dalvik Executable
When reverse engineering Android apps, what can be found in the 'assets/' folder of an APK?
Native code
What is a common objective of reverse engineering Android apps?
Identifying app behaviors
What type of session is planned with DarkNavy on 19th March 2024?
Practice CTF session
Study Notes
Android Reverse Engineering
- Reverse engineering is the process of analyzing a system to understand how it works, often with the intent of duplicating or enhancing its functionality.
- Android app reverse engineering is crucial for understanding app behavior, identifying security vulnerabilities, and creating custom modifications.
Android App Structure
- Android applications are packaged as APK (Android Package) files.
- APK files consist of:
- Manifest file (AndroidManifest.xml)
- Resources (res/)
- Assets (assets/)
- Executable code (DEX files)
Course Overview
- Course title: Android Reverse Engineering
- Instructor: A/Prof. Vivek Balachandran ([email protected])
- Guest Lecture: DarkNavy from China (19th March 2024, 9 AM – 11 AM, Hybrid: Face to face + Zoom session)
- Practice CTF session:
- Getting used to flag detection
- Identifying the level of technical skills of the class
- Introduction to Android Reverse Engineering
Test your knowledge on Android reverse engineering, understanding Android code structure, components in the Manifest file, converting Dex to Smali and source code, analyzing native code, and more. Get ready for a practice Capture The Flag (CTF) session to enhance your skills in flag detection.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free