In part I of this blog we finished the analysis of the native layer and got the decrypted secondary dex file. Here in part II we will continue to analyze it. For the sake of continuity, we will maintain continuous section and figure numbers from part I of the blog.
Fortinet Blog
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.