Request a Demo Contact Us
Bugcrowd Introduces Continuous Attack Surface Penetration Testing
Learn More

Identifying & Avoiding Android App Protections

 

Bug bounties to me are always a race against time. Can we find a payable bug before we waste too much time? There are often specific things developers do to make reversing the applications more painful and take more time. In this presentation we will go over how to quickly identify many different protection schemes (Packers, Obfuscators, anti-techniques) and how to subvert them. Walking away from this presentation you should be armed with a treasure chest of techniques and tools to get to the gooey center of an Android application in no time. Hopefully this translates immediately to a higher ROI of your bug bounty hunting efforts.

More resources

Datasheet

Crowdsourced Security in the Public Sector

Read More
Datasheet

Bugcrowd External Attack Surface Management (EASM)

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.