tags:androidjava original link: DJI - The ART of obfuscation newsletter link: exploits.club Weekly Newsletter 07


Exploits Club Summary:

Quarkslab makes yet another appearance in the newsletter this week for their new post on an “Android Runtime hijacking mechanism for bytecode injection”. This post takes a look at the DJI Pilot application, and breaks down how it uses a packer to obfuscate its code. Well written and highly-detailed, this is worth the read for anyone reversing Android apps.