From mobile devices to smartwatches, automotives, smart refrigerators, and many other devices, Android is ruling the market. This gives an onus on developers to protect the information and integrity of their users by developing a secure code for the applications. This enforces us to secure Android applications used by millions and billions of people across the globe.
This session aims to demonstrate our open-source application, Damn Vulnerable Bank. This application provides an interface for folks interested in android application security to assess their skills. This short course will be packed with static and dynamic analysis, dynamic instrumentation, binary analysis, hacking APKs at a low level, playing with multiple debuggers, and many other interesting discussions. By the end of this session, you will gain an understanding of different threat vectors and exploitability means.