diff --git a/obfuscation.md b/obfuscation.md index a666801..18210e2 100644 --- a/obfuscation.md +++ b/obfuscation.md @@ -102,8 +102,8 @@ I have done a few talks on de-obfuscating Android apps that include a variety of * BlackHat USA 2018: "Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Library" \[[video](https://www.youtube.com/watch?v=s0Tqi7fuOSU)\] + This talk goes over reverse engineering one of the most complex anti-analysis native libraries I've seen used by an Android application. It covers mostly obfuscation techniques in native code. -* REcon 2019: "The Path to the Payload: Android Edition" \[[video](https://recon.cx/media-archive/2019/Session.005.Maddie_Stone.The_path_to_the_payload_Android_Edition-J3ZnNl2GYjEfa.mp4)\] +* REcon 2019: "The Path to the Payload: Android Edition" \[[video](https://youtu.be/mWNNeKuSuwI?si=KSZtuWQVdQzln1AA)\] + This talk discusses a series of obfuscation techniques, solely in Java code, that an Android botnet was using to hide its behavior. -[**NEXT** > 7. Conclusion](conclusion.html) \ No newline at end of file +[**NEXT** > 7. Conclusion](conclusion.html)