Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions obfuscation.md
Original file line number Diff line number Diff line change
Expand Up @@ -102,8 +102,8 @@ I have done a few talks on de-obfuscating Android apps that include a variety of

* BlackHat USA 2018: "Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Library" \[[video](https://www.youtube.com/watch?v=s0Tqi7fuOSU)\]
+ This talk goes over reverse engineering one of the most complex anti-analysis native libraries I've seen used by an Android application. It covers mostly obfuscation techniques in native code.
* REcon 2019: "The Path to the Payload: Android Edition" \[[video](https://recon.cx/media-archive/2019/Session.005.Maddie_Stone.The_path_to_the_payload_Android_Edition-J3ZnNl2GYjEfa.mp4)\]
* REcon 2019: "The Path to the Payload: Android Edition" \[[video](https://youtu.be/mWNNeKuSuwI?si=KSZtuWQVdQzln1AA)\]
+ This talk discusses a series of obfuscation techniques, solely in Java code, that an Android botnet was using to hide its behavior.


[**NEXT** > 7. Conclusion](conclusion.html)
[**NEXT** > 7. Conclusion](conclusion.html)