Start: 2018-04-08 14:00
End: 2018-04-08 18:00
Location: Walter-Gropius-Straße 5, 80807 München
We will have a look at the open source framework Frida (www.frida.re) for dynamic binary instrumentation. The focus will be on getting started using Frida to intercept and modify calls to functions on different levels (e.g. libc, shared libs, Java).
Participants will learn how to make use of Frida: how to trace low level function calls, how to modify the flow of mobile apps and how to use Frida to quickly overcome basic defensive measures like certificate pinning or root detection. Additionally participants are going to learn how to use Frida as a framework for writing their own analysis and instrumentation scripts. Though we focus on Android in this workshop, the basic techniques are transferable to iOS, Linux and Windows as well.
Michael is a freelance security consultant located near Munich, Germany. After studying philosophy, he started his career in web and mobile development, and quickly got interested in IT security. He is currently working in the area of application and infrastructure security, but also likes to dive into binary exploitation and malware analysis.
Hendrik is a security engineer living and working in Hamburg. His focus is on web app and infrastructure security but his secret love are unixoid operating systems, and staring at disassembled code.