Interesting article by Carl Benedict, introducing and dicussing Android applications, development and dissection, using some tools for reverse enginnering. Good focus on the Android permission-based system and how it allows access to resources, and where to alter these controls.
“Under the Hood: Reversing Android Applications”
Carl Benedict, 20 January 2012
Infosec Institute Resources
http://resources.infosecinstitute.com/reversing-android-applications/ – last access 23 January 2012 – ( Full Article )
pktool – a tool used for manipulating .apk files, http://code.google.com/p/android-apktool/
jad – a Java decompiler (Windows only), http://www.varaneckas.com/jad
JD-Core + JD-GUI – another Java decompiler, supporting newer Java versions and features, http://java.decompiler.free.fr
dex2jar – a tool for converting .dex files to .class files, http://code.google.com/p/dex2jar/downloads/list (dex2jar)
Solid State Drive adoption in computers, tablets and devices, is presenting new challenges to the CF community. Good article by Mike Sheward explaining to some depth some of the current Forensic concerns and issues with SSD. Interesting testing and hash results with FTK imager and a write blocker.
“Rock Solid: Will Digital Forensics Crack SSD’s?”
Mike Sheward, 5 January 2012
http://resources.infosecinstitute.com/ssd-forensics/ – last access 23 January 2012 – ( Full Article )