3 Videos for Android 04

PRO
Tier
difficulty_medium_icon
Medium
clock icon
< 1 Hr.
number of users completed icon
2459
image of exercise Android 04: Exploitation in Java
play btn
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Android 04: Exploitation in Java

In this video, we cover the exercise Android 04 from the Android badge series. We demonstrate how to unzip an APK file, decompile it, and reverse engineer its classes to find and decipher a secure storage mechanism.

video duration icon07:35 number of views icon3468

 

image of exercise Android 04: Exploitation in Python
play btn
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Android 04: Exploitation in Python

In this video, we explore the exploitation of an Android application using Python. We'll walk through decompiling the APK, analyzing the app's business logic, and writing a Python script to decrypt a secure storage value.

video duration icon05:03 number of views icon2309

 

image of exercise Android 04: Exploitation in Ruby
play btn
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Android 04: Exploitation in Ruby

In this video, we cover the Android 04 exercise from the Android badge. We demonstrate how to unzip, decompile, and reverse engineer an Android APK to extract and decode a secure key using Ruby.

video duration icon05:12 number of views icon634