Android 'Swiss Army Knife' hack tool released

Powered by SC Magazine
 

Reverse engineering and analysis #Shmoocon

An open source tool has been released that makes it easier to reverse engineer Android applications.

Oter Tool, released today at the Shmoocon security conference in Washington DC, is designed to streamline some of the arduous processes crucial to reverse engineer Android applications.

The application graphical user interface is an easy access to a bundle of typically “annoying procedures” including like installing certificates, and modifying .apk files which is done during static and dynamic analysis of Android apps.

Remember to sign up to our daily newsletter to stay connected with the latest news and analysis from Australia and around the world.

“These common tasks take a huge set of commands which are almost impossible to memorise,” Mathew Rowley, senior consultant at Matasano told SC. 

He said the tool was “a kind of swiss army knife for reversing Android applications”.

The tool, available on github, uses smali/baksmali libraries to decompile Android apps (.apk). It runs on Mac OS X and Linux and could be later written for Windows.

Rowley, a former security technician and penetration tester for US telco Comcast had released an eariler version of the tool at Toorcon 13 last year.

Copyright © SC Magazine, Australia


Android 'Swiss Army Knife' hack tool released
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1132

Vote