For a security analyst, understanding how a mobile app functions is necessary to identify and exploit vulnerabilities. For Android, reverse engineering tools such as Jadx and JD-GUI make it easy to look inside an application to learn how an app works. To defend against these tools, developers turn to Android obfuscation: free and commercial add-on tools that jumble, encrypt, and encode apps to thwart reverse engineering.
In this webcast, SANS Mobile Device Security and Ethical Hacking author Joshua Wright will give you an inside look at how Android obfuscation tools work, and their shortcomings. You'll learn how to combine the functionality of several free tools to undo the work of Android obfuscators, and how to incorporate obfuscated Android app analysis into your next mobile app assessment.