At this workshop, participants learned to set up an analysis laboratory using emulators and virtual machines. Two primary strategies were presented: static analysis, which examines code without executing it, and dynamic analysis, which intercepts traffic to observe the application’s behavior in real-time.

During the sessions, different tools were presented such as Jadx, Mobfs, Objection, Frida, and Burp/MITM Proxy, which are fundamental for conducting effective analysis of Android applications. These tools enabled attendees to enhance their understanding of security and application analysis.

The material of the workshop is available in spanish in this link