{"id":43,"date":"2015-07-06T21:09:44","date_gmt":"2015-07-06T21:09:44","guid":{"rendered":"http:\/\/tkeetch.co.uk\/blog\/?p=43"},"modified":"2016-01-02T10:59:33","modified_gmt":"2016-01-02T10:59:33","slug":"reverse-engineering-obfuscated-android-applications","status":"publish","type":"post","link":"http:\/\/tkeetch.co.uk\/blog\/?p=43","title":{"rendered":"Reverse Engineering Obfuscated Android Applications"},"content":{"rendered":"<p>The slides are now available for <a href=\"http:\/\/tkeetch.co.uk\/slides\/Steelcon2015-Reverse_Engineering_Obfuscated_Android_Applications.pptx\" target=\"_blank\">download<\/a>.<\/p>\n<p>Recently, I&#8217;ve been doing a fair amount of Android application reversing-engineering and many of the more security sensitive applications use obfuscators like <a href=\"https:\/\/www.guardsquare.com\/\" target=\"_blank\">ProGuard and DexGuard<\/a>. At first it can be a little bit daunting, but once you figure out some of the obfuscation techniques it becomes a much more tractible problem.<\/p>\n<p><a href=\"http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/steelcon-logo-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-49 aligncenter\" src=\"http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/steelcon-logo-11-300x59.png\" alt=\"steelcon-logo-11\" width=\"300\" height=\"59\" srcset=\"http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/steelcon-logo-11-300x59.png 300w, http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/steelcon-logo-11.png 353w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>I presented some of what I&#8217;ve learnt at <a href=\"http:\/\/steelcon.info\" target=\"_blank\">SteelCon <\/a>in Sheffield this weekend. The conference is only in its second year, but it seems to be off to a strong start, and very well organised. There was a good mix of students, hobbyists, developers and infosec professionals; with a wide selection of talks to match. I&#8217;d highly recommend it to anyone with an interest in security based in the North of England.<\/p>\n<p>Nothing groundbreaking by any means, but hopefully a useful introduction to people looking to get started with obfuscated Android applications.<\/p>\n<p><a href=\"http:\/\/tkeetch.co.uk\/slides\/Steelcon2015-Reverse_Engineering_Obfuscated_Android_Applications.pptx\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-50 size-medium\" src=\"http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/android_slides-300x125.png\" alt=\"android_slides\" width=\"300\" height=\"125\" srcset=\"http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/android_slides-300x125.png 300w, http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/android_slides-1024x425.png 1024w, http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/android_slides-500x208.png 500w, http:\/\/tkeetch.co.uk\/blog\/wp-content\/uploads\/2015\/07\/android_slides.png 1204w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The slides are now available for download. Recently, I&#8217;ve been doing a fair amount of Android application reversing-engineering and many of the more security sensitive applications use obfuscators like ProGuard and DexGuard. At first it can be a little bit &hellip; <a href=\"http:\/\/tkeetch.co.uk\/blog\/?p=43\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[23,24,20],"_links":{"self":[{"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/43"}],"collection":[{"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=43"}],"version-history":[{"count":7,"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/43\/revisions"}],"predecessor-version":[{"id":54,"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/43\/revisions\/54"}],"wp:attachment":[{"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/tkeetch.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}