Azure ARM64 Android Emulator for Reverse Engineering
Have you ever needed to run an ARM64 APK Natively for dynamic malware analysis or other purposes? I know I have, and it’s tricky when the only hosts you have around are x86 boxes.
In this video, we will go over how to quickly spin up an ARM64 based Cloud instance in Azure, Run an ARM Android Emulator on that box, and then tunnel both ADB and the device screen to your host over SSH via scrcpy.
Full Github Notes available here:
https://github.com/LaurieWired/Azure_ARM64_Android_Emulator_Notes
Timestamps:
00:00 Intro
00:54 Azure Machine Creation
02:05 Architecture Selection
03:30 RDP vs SSH Tunnel
04:13 Cost
05:08 Login
05:54 Docker Install
08:31 User Permissions
10:04 ADB Installation
11:20 REdroid
12:00 Activating Kernel Modules
14:58 Connecting ADB to Emulator
15:45 SSH Tunneling + Scrcpy
17:00 Port Forwarding Android Debug Connection
18:38 Shell and filesystem of Device
20:09 Scrcpy via ADB
22:00 Cleanup
22:46 Stopping vs Deleting Cloud Resources
23:13 Recap
—
Useful Links Mentioned in Video:
Azure: https://portal.azure.com/#home
Docker: https://docs.docker.com/get-docker/
Redroid: https://github.com/remote-android/redroid-doc
Scrcpy: https://github.com/Genymobile/scrcpy
—
laurieWIRED Twitter:
Tweets by lauriewired
laurieWIRED Website:
http://lauriewired.com
laurieWIRED HN:
https://news.ycombinator.com/user?id=lauriewired
laurieWIRED Reddit:
https://www.reddit.com/user/LaurieWired
Views :2537
android emulator