meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, June 23rd 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 23 June 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Deobfuscating Android APK

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, June 23rd, 2016 edition of the Sandton and Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich and the I'm recording from Jackson, Florida.

0:12.0

Boyang got a quick diary up today with some de-obfuscation tricks in one of the Java decompilers that he likes to use to look at Android applications.

0:24.6

In Android, of course, the application is written in Java.

0:27.6

Typically, Java isn't really that difficult to decompile, but in particular in application

0:34.6

that being shipped to users, developers often use off-use

0:39.0

gators in this case ProGuard. ProGard pretty much removes variable names and

0:45.0

like making it very difficult to reverse engineer a binary but as Boyan points out

0:52.0

even his free Java decompiler has a little tool that at least

0:58.0

returns some useful variable in class names to the application to help with reverse engineering.

1:07.0

And talking about obfuscation, Apple apparently is moving away from some of the obfuscation

1:13.3

they have done in the past in the latest iOS 10 beta.

1:18.6

The kernel is no longer encrypted.

1:21.4

These encrypted kernels were not easily reverse engineerable, but apparently the latest version of iOS beta arrived

1:31.5

unencrypted, meaning it should be easier for testers to find vulnerabilities.

1:38.3

There is no official statement about this from Apple, so it's actually possible this was

1:43.2

a mistake, even though that's quite unlikely, but instead it's actually possible this was a mistake even though that's

1:44.8

quite unlikely but instead it's more likely that they're trying through this

1:50.5

beta phase to get more people to look under the hood of this software and to try

1:57.5

to figure out more vulnerabilities to have them fixed before the final product is released.

2:04.0

In Microsoft released another beta for its simple encrypted arithmetic library or seal.

2:11.2

This library is something that developers certainly should take a look at in that it does allow for something called

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.