2022-07-04, 14:20–17:20 (Europe/Paris), Workshop Room
FЯIDA (frida.re) is a dynamic instrumentation tool that supports reverse engineering closed-source applications. Learning how to use this tool enables open-source contributors to build interfaces to closed-source or even re-implement protocols for compatibility.
Organization note: registration to the workshop will be done directly on-site during the event. Nothing to do on-line.
In this workshop, you will learn how to use FЯIDA on real-world targets. The only prerequisite are basic programming skills, you will learn everything else in the workshop. Depending on your prior knowledge, we will solve simple crackmes or analyze complex applications and daemons on mobile devices.
Prerequisites: if you can, please bring a laptop and install Android Studio including an Android VM without Google Play Services for preparation (see resources attached below). Optionally, you can also bring other devices that support FЯIDA, such as rooted Android phones or jailbroken iPhones. This will save time that you can spend on solving challenges and learning FЯIDA instead.
While this workshop is meant for beginners, feel free to join as advanced FЯIDA user. FЯIDA is a great tool to explore proprietary systems like iOS, there's always something new to learn about.
Maximum of 15 students.
Jiska is a security researcher at Secure Mobile Networking Lab, TU Darmstadt.