If you own an Android device, you’ve more than likely heard of an APK file. How easy are Android distributables to examine and extract information?
Some companies assume resources, APIs and more are private among the APK while others, aware of the risk, take part in a constant cat and mouse game of application security. A variety of tools have additionally emerged to make the extracting of contents from an APK much more difficult.
In this talk we will look at the Android package and examine how we can explore it in order to extract information while looking at some of the products and tools used by both sides.
Sign in to add slides, notes or videos to this session