- This event has passed.
Android Re-engineering 101 (Re-Run)
September 23 @ 7:00 pm - 9:00 pm
Place: ADC 203, HKU SPACE 金鐘夏慤道18號海富中心.
Speaker: Mr. Paul Chow
Format : On-site and Online (Zoom)
Language : in Cantonese
Presentation Slide : in English
This workshop was run in 2018 for the Hong Kong CTF Members. The content is same so we called it Re-Run.
Mr. Paul Chow is the Treasurer of Hong Kong CTF Association. Mr. Chow (CISSP, CEH, CEI, OSWP, CDPSE) is over 35 year IT experience on Software Development, Project management and Technical Support Management . In the past 10 years, Paul Chow switched his focus on IT Security and Cyber Security Assessment services.
Welcome to Android Reverse Engineering 101! This workshop’s goal is to give you the foundations to begin reverse engineering Android applications. While this workshop won’t teach you the details of Android app development, Android malware analysis, Android vulnerability hunting, etc.
It will be wholly based on reverse engineering through static analysis, or analyzing and understanding an application by examining its code.
You need to prepare a notebook computer with VMware (VM Workstation) with power supply.
We will do Zoom on line for this workshop. However, we recommended you need two devices to run Zoom (smart phone)and VM Workstation (a Notebook computer) separately.
Zoom link and VM image download link will be provided 1 days before the event.
Members of Hong Kong CTF Association and invited guests have higher propriety to join this workshop. Hong Kong CTF Association has the right to reject anyone to join this workshop with an email notice to the registered audience before or after the event started.
Look forward to sharing the CTF technique and skills with you all !