The reverse of the Android APK program is much simpler than the reverse of the windowsPE file.
1. Android APK program is actually a zip, can be opened with WinRAR, extract will see a very familiar directory, there are androidmanifest.xml files, various resources and pictures
2.xml Open With Notepad, you will see garbled, so you need to use the Axmlprinter2.jar tool for processing, the command is as follows:
Java-jar Axmlprinter2.jar androidmanifest.xml > AndroidManifest.txt
At this time open AndroidManifest.txt, you will see and the source is almost, also no garbled.
3.APK all. Java code is compiled into the Classes.dex file, so to know the procedure and specific functions of the program, you have to decompile the file, using the Baksmali.jar tool
Java-jar Baksmali.jar-o Classout/classes.dex
After the execution, generate a classout directory, go to the Android directory,. Smali, it corresponds to the. Java code, let's see. Small code is OK, although not standard Java code, but after looking at the habit is very simple, At least it's much simpler than the Windows assembler ...
4. Finally, after the anti-compilation, we can change the code to change the resources, after the change, we have to compile back, using the Smali.jar tool
Java-jar Smali.jar classout/-o classes.dex
After this is done, and then stuffed into the apk, so that the program can still run, hehe!
12 points more, sleepy Ah, sleep.
Android APK anti-compilation reverse