In this chapter, we learned about reversing Android applications using various methods and analyzing the source code. We also learned how we could modify the source code and then recompile the application in order to bypass some of the protections. Also, we saw how to find vulnerabilities in Android applications using tools such as Drozer. You could also get your hands-on with various vulnerabilities in the Exploit-Me labs developed by Security Compass available at http://labs.securitycompass.com/exploit-me/.
In the next chapter, we will go a step further and do traffic interception of Android applications and use it in our pentesting.