0 1 00:00:07,530 --> 00:00:13,920 After developing a basic app which was in fact a malicious app we will now change our hat and go through 1 2 00:00:13,920 --> 00:00:19,280 the analysis of the malicious app through the eyes of a reverse engineer. 2 3 00:00:19,310 --> 00:00:24,710 Here we will use the tools that we installed during the lab setup section to analyze the malicious app 3 4 00:00:25,800 --> 00:00:27,680 using the tools we installed earlier. 4 5 00:00:27,690 --> 00:00:35,150 We will conduct static analysis dynamic analysis and automated analysis of our sample. 5 6 00:00:35,170 --> 00:00:41,290 We will start off by providing a comparison of static dynamic and automated analysis. 6 7 00:00:41,290 --> 00:00:49,130 We will conduct static analysis using apktool, bytecode viewer and Androguard, dynamic analysis 7 8 00:00:49,160 --> 00:00:51,800 will be conducted using objection. 8 9 00:00:51,800 --> 00:00:58,010 And finally we will show you a number of online malware sandboxes that can be used for automated analysis.