Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Secrets and Lies: Protecting Mobile Apps Through Cryptography and Obfuscation
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Lock Picking
- 3 Security Through obscurity
- 4 Navajo
- 5 Encryption
- 6 Risk Management
- 7 Raising the Bar
- 8 Bots
- 9 Strings
- 10 Tools
- 11 Avoid sensitive strings
- 12 Storing sensitive API keys
- 13 You cannot authenticate an app
- 14 Monitor your logs
- 15 Hide some secrets
- 16 Base64
- 17 ToolD
- 18 AES
- 19 Stronger strings
- 20 Random keys
- 21 Real strings
- 22 Real life obfuscation
- 23 When I hack programs
- 24 Random data
- 25 steganography
- 26 scanning for strings
- 27 using Charles
- 28 certificate pinning
- 29 certificate validator
- 30 secret knock
- 31 secret key
- 32 attack your app
- 33 Debugging
- 34 Hardening
- 35 Protect Data