Learn Reverse Engineering By Taking Apart Android Games
- Description
- Curriculum
- FAQ
- Reviews
About The Course:
During this course you’ll develop the skills required to reverse engineer Android games and applications, statically and dynamically modify those applications, and develop simple proof of concept applications.
By the end of this course you’ll be able to create simple Android applications, reverse engineer your own and the applications of others, and modify these applications both statically and dynamically.
There are several quiz and assignment style challenges through the course designed to support your learning and provide practical learning opportunities.
This course will teach you all you need to know about Android reverse engineering, however, it is advised to come into this course with an already existing knowledge of programming and computational skills (such as using a CLI and computational thinking).
About The Author:
James Stevenson has been working in the programming and computer security industry for over 5 years, and for most of that has been working as an Android software engineer and vulnerability researcher. Prior to this, James graduated with a BSc in computer security in 2017. James has featured articles on both personal websites and industry platforms such as Infosecurity Magazine – covering topics from security principles to android programming and security to cyber terrorism. James is a full-time security researcher, part-time PhD student, and occasional conference speaker. Outside of Android internals, James’ research has also focused on offender profiling and cybercrime detection capabilities.
-
1IntroductionVideo lesson
During this section I'll introduce you to the course, what to expect, and talk a bit about my background and skillset.
-
2ToolingVideo lesson
During this lecture we'll go through all of the required tools that we'll use through the course and how to get them all running.
-
3Where You Stand QuizQuiz
This quiz is designed to set the scene and to get an idea of your strengths and areas to improve before starting the course. We'll be repeating this quiz later on to show how you've developed!
-
4Study GuideText lesson
https://ko-fi.com/s/b9692b6339
-
5IntroductionVideo lesson
An introduction to Android applications, compilation and assembly, as well as the SMALI instruction set.
-
6Build a simple game in JavaVideo lesson
During this lecture we'll build a simple 'cookie-clicker-esk' game to learn the basics of Java, that we'll use throughout the course.
-
7Reverse engineering an APKVideo lesson
During this lecture we'll reverse engineer the cookie-clicker game that we created, ad identify key aspects of the application.
-
8Build a simple game in GodotVideo lesson
During this lecture we'll create a simple game using Godot. We'll use what we've learnt here later on to reverse engineer other Godot games.
-
9Reverse engineering an APKVideo lesson
During this lecture we'll reverse engineer the game we created using Godot.
-
10Reverse engineering other gamesVideo lesson
During this lecture we explore open source Android games and take one of them to reverse engineer and explore.
-
11Build A Simple Game In Java or GodotText lesson
-
12Reverse Engineer A GameText lesson
-
13Extra: Android Malware Reverse Engineering TasterText lesson
In the future I'm planning on releasing a Udemy course on reverse engineering Android malware. If this would interest you feel free to sign up to my mailing list here to receive an early bird discount when it's released. Until then find below a taster article on how we can apply the lessons learnt from this course to Android malware reverse engineering.
-
14Patching An APKVideo lesson
During this lecture we take the cookie-clicker-esk game that we created earlier on and statically patch the disassembled SMALI to change the functionality of the game.
-
15Dynamic InstrumentationVideo lesson
During this lecture we dynamically modify an Android game using dynamic instrumentation and Frida.
-
16Modify A GameText lesson
External Links May Contain Affiliate Links read more