watching you watching us . .

Archive for January, 2012

Reverse Engineering Android Applications

Interesting article by Carl Benedict, introducing and dicussing Android applications, development and dissection, using some tools for reverse enginnering. Good focus on the Android permission-based system and how it allows access to resources, and where to alter these controls.

“Under the Hood: Reversing Android Applications”
Carl Benedict, 20 January 2012
Infosec Institute Resources
http://resources.infosecinstitute.com/reversing-android-applications/ – last access 23 January 2012 – ( Full Article )

Tools:

pktool – a tool used for manipulating .apk files, http://code.google.com/p/android-apktool/

jad – a Java decompiler (Windows only), http://www.varaneckas.com/jad

JD-Core + JD-GUI – another Java decompiler, supporting newer Java versions and features, http://java.decompiler.free.fr

dex2jar – a tool for converting .dex files to .class files, http://code.google.com/p/dex2jar/downloads/list (dex2jar)

/cobramark3

Advertisements

Solid State Disks, Update, Forensic Implications ?

Solid State Drive adoption in computers, tablets and devices, is presenting new challenges to the CF community. Good article by Mike Sheward explaining to some depth some of the current Forensic concerns and issues with SSD. Interesting testing and hash results with FTK imager and a write blocker.

“Rock Solid: Will Digital Forensics Crack SSD’s?”
Mike Sheward, 5 January 2012
http://resources.infosecinstitute.com/ssd-forensics/ – last access 23 January 2012 – ( Full Article )