├── .gitattributes
├── .gitignore
├── DEFCON23
├── O&D - Android Reverse Engineering.pdf
├── README.md
└── challenges
│ ├── defensive
│ ├── crackmes
│ │ ├── four
│ │ │ └── AllMixedUp.apk
│ │ ├── garage4hackers
│ │ │ ├── GETSECRET.apk
│ │ │ ├── SENDSECRET.apk
│ │ │ └── readme.md
│ │ ├── one
│ │ │ └── DontSmokeCrack.apk
│ │ ├── three
│ │ │ └── GoAheadCrackMe.apk
│ │ └── two
│ │ │ └── DontCrackMeBro.apk
│ ├── malware
│ │ ├── README.md
│ │ └── def_examples.zip
│ ├── packers
│ │ ├── bangcle
│ │ │ └── nh.four.apk
│ │ ├── liapp
│ │ │ └── 411ecbaa48fa8dd2aa1df6f716f3ff1afdfb926e.apk
│ │ └── pangxie
│ │ │ └── com.playgame.good.tankwars3D.apk
│ └── somethingware
│ │ ├── 1350f7c84710e373f97e27d6880ca9a6ed065d4a.apk
│ │ ├── 42b25b60aa7d6d9f0b388c10a45e8a8f8c1fc718.apk
│ │ ├── c14ed08b2ffd360c937ed3f83bf26c2887710da1.apk
│ │ └── e99dd3229dc9ff70f6e768342ca27d984e796f1a.apk
│ └── offensive
│ └── getsuperserial
│ ├── FWUpgrade.apk
│ └── fotabinder
└── README.md
/.gitattributes:
--------------------------------------------------------------------------------
1 | * text=auto
2 | *.pdf diff=astextplain
3 | *.pdf diff=astextplain
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | *~
2 | #*#
3 | .DS_Store
--------------------------------------------------------------------------------
/DEFCON23/O&D - Android Reverse Engineering.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/O&D - Android Reverse Engineering.pdf
--------------------------------------------------------------------------------
/DEFCON23/README.md:
--------------------------------------------------------------------------------
1 | # Offensive & Defensive Android Reverse Engineering
2 |
3 | Training materials crafted and publicly provided by Red Naga members;
4 | - Jon 'jcase' Sawyer
5 | - Tim 'diff' Strazzere
6 | - Caleb 'I need something to put here' Fenton
7 |
8 | Due to some issues with the github inline PDF viewer, we would highly suggest downloading the [PDF](https://github.com/rednaga/training/blob/master/DEFCON23/O%26D%20-%20Android%20Reverse%20Engineering.pdf) and opening it on your machine. Originally presented at the [DEFCON 23 workshops](https://www.defcon.org/html/defcon-23/dc-23-workshops-schedule.html#Strazzere)
9 |
10 | Vulnerabilities discussed are disclosed in the [rednaga/disclosures repo](https://github.com/rednaga/disclosures), specifically;
11 | - ["HTC Peap" CVE-2015-5525, CVE-2015-5526 & CVE-2015-5527](https://github.com/rednaga/disclosures/blob/master/HTCPeap.md)
12 | - ["Qualcomm System Agent", No CVEs assigned](https://github.com/rednaga/disclosures/blob/master/QCOMSysAgent.md)
13 |
14 | Some of the resources which where originally provided on the USB drive passed around are available in the [challenges directory](https://github.com/rednaga/training/blob/master/DEFCON23/challenges/).
15 |
16 | ### Abstract
17 |
18 | Thinking like an attacker, you will learn to identify juicy Android targets, reverse engineer them, find vulnerabilities, and write exploits. We will deep dive into reverse engineering Android frameworks, applications, services, and boot loaders with the end goal of rooting devices.
19 |
20 | Approaching from a defensive perspective, we will learn quickly triage applications to determine maliciousness, exploits, and weaknesses. After learning triage skills, we will deep dive into malicious code along while dealing with packers, obfuscators, and anti-reversing techniques.
21 |
22 | Between the offensive and defensive aspects of this class, you should walk away with the fundamentals of reverse engineering and a strong understanding of how to further develop your skills for mobile platforms.
23 |
24 | ### Prerequisites
25 | We would expect students to know minimal reverse engineering concepts. Would also be good, though not required, to have some of the following non-free tools:
26 |
27 | - IDA Pro
28 | - Hopper
29 | - JEB
30 |
31 | ### Licensing
32 |
33 | 
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
34 | TLDR - free for personal use, commercial use is forbidden unless you contact us and gain permission
35 |
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/crackmes/four/AllMixedUp.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/crackmes/four/AllMixedUp.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/crackmes/garage4hackers/GETSECRET.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/crackmes/garage4hackers/GETSECRET.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/crackmes/garage4hackers/SENDSECRET.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/crackmes/garage4hackers/SENDSECRET.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/crackmes/garage4hackers/readme.md:
--------------------------------------------------------------------------------
1 | Garage4Hackers July 2015 Mobile Application CTF
2 | So, its July,2015 mobile application CTF up. This CTF is linked with Ranchoddas webcast which we scheduled on the 17th July, 2015.
3 |
4 | If you looking for registration form for webcast, you can find Here
5 |
6 | CTF Rules
7 | There is no rule
8 |
9 | What is Task ?
10 |
11 | The participant needs to download the attached APKs.
12 |
13 | We have two android binaries GETSECRET.apk and SENDSECRET.apk. GetSecret is the entry point to the CTF.
14 |
15 | If everything goes right a secret is send from SendSecret to GetSecret. You need to capture this secret to get the flag.
16 |
17 | GETSECRET.apk
18 | Download Link : https://dl.dropboxusercontent.com/u/.../GETSECRET.apk
19 | Code:
20 | GETSECRET.apk File SHA256: 720a1383fa333d3fe92b35fcedcf1669bcff7a0e3b7e0d70e9e157e694c2672f
21 | SENDSECRET.apk
22 | Download Link: https://dl.dropboxusercontent.com/u/...SENDSECRET.apk
23 | Code:
24 | SENDSECRET.apk File SHA256: 23348d0c83f1cdf602da69a6ce4e7a04dc4328cb79b5c2baf009ea1f966fa4bc
25 | Submit Flags and write ups to: s@garage4hackers.com .
26 |
27 | If you have any question regarding CTF, we are active at twitter @garage4hackers @sandeepL337 @ajinabraham
28 |
29 | Original CTF sponsors for Garage4Hackers;
30 | - SecureLayer7
31 | - netsparker
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/crackmes/one/DontSmokeCrack.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/crackmes/one/DontSmokeCrack.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/crackmes/three/GoAheadCrackMe.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/crackmes/three/GoAheadCrackMe.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/crackmes/two/DontCrackMeBro.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/crackmes/two/DontCrackMeBro.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/malware/README.md:
--------------------------------------------------------------------------------
1 | # Arc 2 - Defensive Samples
2 |
3 | The password to [def_examples.zip](def_examples.zip) is `infected`. The archive contains malware samples:
4 |
5 | **def_example1.apk**
6 |
7 | * sha1: 1350f7c84710e373f97e27d6880ca9a6ed065d4a
8 | * sha256: 32866d1912cfb60e879046a5aaceedf8a03924e39d34d6ebe44d672163a0a1e2
9 | * md5: a0aec2a7e85b86130c059c0c48d16050
10 |
11 | **def_example2.apk**
12 |
13 | * sha1: c14ed08b2ffd360c937ed3f83bf26c2887710da1
14 | * sha256: a0c2cab5ca8b7b4f78632d258ce79c638379bc237f7b847195200de3de2138c0
15 | * md5: ce71087a4f94f436bbbd5ca1aa5c08db
16 |
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/malware/def_examples.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/malware/def_examples.zip
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/packers/bangcle/nh.four.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/packers/bangcle/nh.four.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/packers/liapp/411ecbaa48fa8dd2aa1df6f716f3ff1afdfb926e.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/packers/liapp/411ecbaa48fa8dd2aa1df6f716f3ff1afdfb926e.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/packers/pangxie/com.playgame.good.tankwars3D.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/packers/pangxie/com.playgame.good.tankwars3D.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/somethingware/1350f7c84710e373f97e27d6880ca9a6ed065d4a.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/somethingware/1350f7c84710e373f97e27d6880ca9a6ed065d4a.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/somethingware/42b25b60aa7d6d9f0b388c10a45e8a8f8c1fc718.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/somethingware/42b25b60aa7d6d9f0b388c10a45e8a8f8c1fc718.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/somethingware/c14ed08b2ffd360c937ed3f83bf26c2887710da1.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/somethingware/c14ed08b2ffd360c937ed3f83bf26c2887710da1.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/defensive/somethingware/e99dd3229dc9ff70f6e768342ca27d984e796f1a.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/defensive/somethingware/e99dd3229dc9ff70f6e768342ca27d984e796f1a.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/offensive/getsuperserial/FWUpgrade.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/offensive/getsuperserial/FWUpgrade.apk
--------------------------------------------------------------------------------
/DEFCON23/challenges/offensive/getsuperserial/fotabinder:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/rednaga/training/f5fe9253314c38e6ae519e4a7019b3122e547d35/DEFCON23/challenges/offensive/getsuperserial/fotabinder
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Red Naga Training Docs
2 | Training materials crafted and publicly provided by Red Naga members
3 |
4 |
5 | 
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
6 | TLDR - free for personal use, commercial use is forbidden unless you contact us and gain permission
7 |
--------------------------------------------------------------------------------