Analysis of Trojan APK

Analysis of Trojan APK

Assessment

Interactive Video

Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial explains how Android applications request permissions, focusing on the Android Manifest XML file. It covers the distinction between normal and dangerous permissions and how users can revoke permissions starting from Android 6.0. The tutorial then delves into static malware analysis, using a Trojan APK as an example. It highlights the importance of checking permissions and activity tags in the manifest file. The video also demonstrates how to use keyword searches in JD GUI to identify potential malicious activities, such as external server connectivity through sockets and HTTP declarations.

Read more

1 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What new insight or understanding did you gain from this video?

Evaluate responses using AI:

OFF