Totally impressed by the level of this blog post on de-obfuscation of an advanced packer

blog.quarkslab.com/dji-the-art

I hadn't ever seen the trick about "stealing bytecode" from methods from the ART class verification stage.

#Android #packer #secneo

Follow

@cryptax wow yeah impressive. And app in question isn't malware. it is a well known company using a super complex packer. It seems that APK is not in either, I wonder if that's related. They do have this DJI Pilot app on , any ideas if it has the same kind of packer?

This kind of thing highlights how app review processes must review source code in order to be effective. Binary-only reviews like and are at a disadvantage.

Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml