Number of mobile applications is rising and Android still holds large market share.
As these numbers of applications grow, we need better tools to understand how applications work and to analyze them. There is always a question if we can trust mobile applications to do only that that they are allowed to do and if they are really secure when transmitting our personal information to different servers. We will demonstrate, what can be found in mobile applications based on our experience. In the presentation some runtime techniques will be discussed and tool will be demonstrated. We will also be releasing and presenting tool can help developers to analyze runtime mobile Android applications and help them to look for different kind of vulnerabilities.
Basic principle of this method is injecting small piece of code into APK and then connect to it and use Java Reflection to runtime modify value, call methods, instantiate classes and create own scripts to automate work.
Tool is Java based and simple to use, but offers quite few new possibilities for security engineers and pentesters.
More information about Hackito Ergo Sum here : http://www.hackitoergosum.org
adb pull /data/app(or app-private)/app1.apk
adb pull /data/app/app1.apk
java –jar baksmali.jar –o C:\pentest\app\classes.dex