Introduction to DBI ... or how to tamper with any app (including SmitteStop [0])
Dynamic Binary Instrumentation (DBI) is a powerful method to change the behavior of apps (or rather: any binary code) at runtime.
I will go through using the toolkit "frida" [1] to inject custom logic into Java bytecode easily, but also show that we can hook into native apps, like "SmitteStop", to unlock the secret menus, easter eggs, etc.
After this talk the following sentence will make sense: "I just used a Python tool to inject JavaScript into my Android/Java app, to change the behavior of the mono runtime".
[0] https://play.google.com/store/apps/details?id=com.netcompany.smittestop_exposure_notification [1] https://frida.re/
Speakers for Introduction to DBI ... or how to tamper with any app (including SmitteStop):
Metadata for Introduction to DBI ... or how to tamper with any app (including SmitteStop)
To be recorded: YesURLs for Introduction to DBI ... or how to tamper with any app (including SmitteStop)
Recording: https://www.youtube.com/watch?v=_yq69TL999U
Schedule for Introduction to DBI ... or how to tamper with any app (including SmitteStop)
- Thursday, Aug 13th, 2020, 16:00 (CEST) - Thursday, Aug 13th, 2020, 17:00 (CEST) at Speakers Tent