Luke McLaren
Mobile reverse engineer @datalocaltmp. Founded Signal 11 Research - https://s11research.com, and previously maintained https://theappanalyst.com.
Claimed bounties with Meta, Ring, Match.com, Biden Campaign, Bird Scooters, and many others; always looking for that next bug.
Sessions
06-30
13:00
60min
Mobile Visualization for Reverse Engineering & Debugging
Luke McLaren
Mobile reverse engineering can be significantly accelerated through generating visualizations of execution paths. This workshop will demonstrate the tools and methods required to visualize execution for Android's Java and Native layers as well as the Objective-C layer for iOS.
Content will be based upon previous work: https://datalocaltmp.com/visualizing-android-code-coverage-pt-2.html as well as introduce new methods for Java and Objective-C visualization.
Workshop Software
Soprano A