首页
社区
课程
招聘
[翻译]Android安全分析挑战:运行时篡改Dalvik字节码
发表于: 2013-4-24 21:49 27889

[翻译]Android安全分析挑战:运行时篡改Dalvik字节码

2013-4-24 21:49
27889
收藏
免费 6
支持
分享
最新回复 (33)
雪    币: 211
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
26
好文,赞一个!
谢谢分享啊!
2013-7-30 14:42
0
雪    币: 245
活跃值: (13)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
27
谢谢楼主分享
2013-7-30 15:16
0
雪    币: 258
活跃值: (15)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
28
很有意思。。。

不过内容不够详细啊。。。好多地方木有涉及到细节。
看完了知道一个大概,但是还是云里雾里, 好多细节方面的东西搞不清楚啊。。。
2013-8-9 17:20
0
雪    币: 211
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
29
顶,感谢楼主的好文章
2013-8-17 23:47
0
雪    币: 53
活跃值: (734)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
30
不错 感谢分享
2014-7-26 10:00
0
雪    币: 275
活跃值: (254)
能力值: ( LV7,RANK:100 )
在线值:
发帖
回帖
粉丝
31
好文章,好技术!
2014-7-26 11:10
0
雪    币: 275
活跃值: (254)
能力值: ( LV7,RANK:100 )
在线值:
发帖
回帖
粉丝
32
Figure 3: Scan result of virustotal. Original malware (top) and modified APK (bottom).

If you want to extract the files from the APK you can use the Android internal tools or manually binary edit the APK file and clear the ‘isEncrypted’ flag. This can be done using hexedit or other binary editing tool, but this is not very handy. You may use this short python script that does this job for Conclusion

Hopefully this challenge served as a useful walk through into the art of the possible in terms of how a malware or badware application can hide it’s existence in it’s quest to taint the mobile app marketplace. The Bluebox Labs research team wanted to share this challenge as part of our ongoing efforts to share issues that we come across as we look at the diverse set of mobile threats that are out there. Certainly many other techniques exist, and we’ll review those in future posts. Until then, follow us on twitter@BlueboxSec to hear more about what we’re working on.
2014-7-26 13:14
0
雪    币: 3
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
33
楼主,能否聊聊?小米招逆向工程师了,QQ/微信:38803219
2015-12-8 13:49
0
雪    币: 573
活跃值: (1009)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
34
mark
2015-12-10 10:07
0
游客
登录 | 注册 方可回帖
返回
//