Android 'Swiss Army Knife' hack tool released

Powered by SC Magazine
 

Reverse engineering and analysis #Shmoocon

An open source tool has been released that makes it easier to reverse engineer Android applications.

Oter Tool, released today at the Shmoocon security conference in Washington DC, is designed to streamline some of the arduous processes crucial to reverse engineer Android applications.

The application graphical user interface is an easy access to a bundle of typically “annoying procedures” including like installing certificates, and modifying .apk files which is done during static and dynamic analysis of Android apps.

Remember to sign up to our daily newsletter to stay connected with the latest news and analysis from Australia and around the world.

“These common tasks take a huge set of commands which are almost impossible to memorise,” Mathew Rowley, senior consultant at Matasano told SC. 

He said the tool was “a kind of swiss army knife for reversing Android applications”.

The tool, available on github, uses smali/baksmali libraries to decompile Android apps (.apk). It runs on Mac OS X and Linux and could be later written for Windows.

Rowley, a former security technician and penetration tester for US telco Comcast had released an eariler version of the tool at Toorcon 13 last year.

Copyright © SC Magazine, Australia


Android 'Swiss Army Knife' hack tool released
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 696

Vote