Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

B(l)utter - Reversing Flutter Applications - HITB2023HKT COMMSEC Day 2

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for reverse engineering Flutter applications in this comprehensive conference talk. Delve into the challenges of reading Dart snapshots and learn about a new methodology that leverages Dart runtime source code directly. Discover how this approach reduces compiling time and enables metadata extraction without launching Flutter applications. Gain insights into the types of information obtainable and their applications in the reverse engineering process. Get introduced to B(l)utter, an open-source tool that demonstrates this new approach, capable of automatically extracting metadata from Dart snapshots, analyzing compiled code, and generating Frida functions for hooking and data dumping in running Flutter applications. Presented by Worawit Wangwarunyoo, a security researcher specializing in Windows and Linux exploitation, this talk offers valuable knowledge for those interested in vulnerability research, exploit development, and reverse engineering.

Syllabus

#HITB2023HKT #COMMSEC D2 - B(l)utter – Reversing Flutter Applications - Worawit Wangwarunyoo

Taught by

Hack In The Box Security Conference

Reviews

Start your review of B(l)utter - Reversing Flutter Applications - HITB2023HKT COMMSEC Day 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.