Android Application Hacking with Damn Vulnerable Bank

Abstract

From mobile devices to smartwatches, automotives, smart refrigerators, and many other devices, Android is ruling the market. This gives an onus on developers to protect the information and integrity of their users by developing a secure code for the applications. This enforces us to secure Android applications used by millions and billions of people across the globe.

This session aims to demonstrate our open-source application, Damn Vulnerable Bank. This application provides an interface for folks interested in android application security to assess their skills. This short course will be packed with static and dynamic analysis, dynamic instrumentation, binary analysis, hacking APKs at a low level, playing with multiple debuggers, and many other interesting discussions. By the end of this session, you will gain an understanding of different threat vectors and exploitability means.

Date
Sep 2, 2021 12:00 AM
Location
Virtual
Rewanth Tammana
Rewanth Tammana
Senior Security Architect

Rewanth Tammana is a security ninja, open-source contributor, and Senior Security Architect at Emirates NBD. He is passionate about DevSecOps, Application, and Container Security. He added 17,000+ lines of code to Nmap (famous as Swiss Army knife of network utilities). Holds industry certifications like CKS (Certified Kubernetes Security Specialist), CKA (Certified Kubernetes Administrator), etc. Rewanth speaks and delivers training at multiple international security conferences around the world including Black Hat, Defcon, Hack In The Box (Dubai and Amsterdam), CRESTCon UK, PHDays, Nullcon, Bsides, CISO Platform, null chapters and multiple others. He was recognized as one of the MVP researchers on Bugcrowd (2018) and identified vulnerabilities in several organizations. He also published an IEEE research paper on an offensive attack in Machine Learning and Security. He was also a part of the renowned Google Summer of Code program.

Related