This reverse engineering video is part of a lecture&lab offered at the Secure Mobile Networking Lab. The first module covers the non-technical basics of reverse engineering, e.g., how to choose a target that is legal and ethical to reverse engineer, reporting bugs and getting bug bounties. Then, we create a project example that is suitable as a student lab for a semester. A brief technical demo shows that the chosen target is indeed beginner-friendly to reverse engineer with Ghidra+Frida and has no obfuscation or jailbreak detection.
Chapters:
0:00 How to become a reverse engineer
3:32 Goals of this lab
10:10 Organization
16:26 Legal background
34:19 Ethics
50:30 Project proposal example - analysing Signal
1:03:13 Demo: First steps into Signal app analysis
1:19:05 Exercises, preparations, tasks
Ещё видео!