Mobile Hacking Conference Talk

Djini in a Bottle:
Faster Exploits, Same Chaos

By Ken Gannon

Over the years, Ken has amassed a significant collection of Android application exploits.
This work typically involved decompiling applications, manually reviewing code, and creating proof-of-concept payloads to exploit the vulnerabilities.


Djini has fundamentally changed his approach to Android application hacking and is now a core tool in his day-to-day work as a security researcher.

In this talk, he will walk through what his previous workflow looked like and compare it to how he works today with Djini.
The session includes real examples from past research, comparing manual reversing of older exploits with the same tasks performed using Djini.

Thank you!
Bio

Ken Gannon

Ken Gannon (伊藤 剣), also known as “Yogehi,” is a mobile security researcher specializing in Android internals, exploit development, and real-world vulnerability discovery.

He has demonstrated high-impact mobile exploit chains at competitions such as Pwn2Own Mobile, earning recognition for practical attacks against flagship devices.

Ken focuses on application security abuse, deep-link flaws, and automation of offensive testing, and contributes to tools that help scale mobile security research. When not reversing APKs, he is usually sharing findings with the community or proving that most “impossible” bugs just need more stubbornness.

Ken is also the trainer inside our Advanced Android Hacking course, where he shows you what it takes to Pwn2Own and breaks down the record breaking 11-link exploit chain.
Write your awesome label here.

Register here: