{"id":1525,"date":"2015-03-26T17:10:24","date_gmt":"2015-03-26T15:10:24","guid":{"rendered":"http:\/\/sseblog.ec-spride.de\/?p=1525"},"modified":"2015-03-26T17:10:24","modified_gmt":"2015-03-26T15:10:24","slug":"first-android-hacking-event","status":"publish","type":"post","link":"https:\/\/blogs.uni-paderborn.de\/sse\/2015\/03\/26\/first-android-hacking-event\/","title":{"rendered":"First Android Hacking Event @SSE &#8211; A short summary"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_1525 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_1525')){$('.twoclick_social_bookmarks_post_1525').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blogs.uni-paderborn.de\\\/sse\\\/2015\\\/03\\\/26\\\/first-android-hacking-event\\\/\",\"post_id\":1525,\"post_title_referrer_track\":\"First+Android+Hacking+Event+%40SSE+%26%238211%3B+A+short+summary\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/blogs.uni-paderborn.de\/sse\/files\/2015\/03\/P1000982.jpg\" alt=\"\" width=\"572\" height=\"433\" \/><br \/>\nOn 17th of march, we organized our first Android Hacking event. Our participants (a mix of students, security researchers, PhD-students and Post-Docs) had to solve various Android-based challenges on different levels of complexity. Each challenge involved reverse-engineering a specific application <em>without<\/em> access to the app&#8217;s source code &#8211; similar to what malware analysts need to accomplish in their daily jobs. Inside these apps, passwords needed to be found, key checking algorithms needed to be understood, and hidden functionality had to be discovered. To accomplish this task, the participants were using different analysis techniques including debugging, decompilation, and fuzzing.<\/p>\n<p>The event was not only great fun for\u00a0 both the participants and the organizers, but also allowed us to provide free <a title=\"CodeInspect \u2013 Binary Android Analysis\" href=\"http:\/\/sseblog.ec-spride.de\/tools\/codeinspect\/\">CodeInspect<\/a> licenses for the day, to be used and tested on the challenges. We were very satisfied with the feedback we got on the tool &#8211; we&#8217;re making rapid progress towards a stable product. Stay tuned for commercial CodeInspect offerings. In the meantime, our free beta program is still running.<\/p>\n<p>At almost midnight, the winners of the challenges were finally found: Andreas Wittmann, Max Weller and Daniel Magin\u00a0scored best. Congratulations from the Android team @ SSE.<\/p>\n<p><!--more--><\/p>\n<p>Pictures:<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>On 17th of march, we organized our first Android Hacking event. Our participants (a mix of students, security researchers, PhD-students and Post-Docs) had to solve various Android-based challenges on different levels of complexity. Each challenge involved reverse-engineering a specific application &hellip; <a href=\"https:\/\/blogs.uni-paderborn.de\/sse\/2015\/03\/26\/first-android-hacking-event\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6581,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,1],"tags":[],"class_list":["post-1525","post","type-post","status-publish","format-standard","hentry","category-android","category-general"],"_links":{"self":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/users\/6581"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/comments?post=1525"}],"version-history":[{"count":0,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1525\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/media?parent=1525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/categories?post=1525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/tags?post=1525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}