First step: Code obfuscation (note the introduction of third-party jars)When creating a project in a new version of ADT, the mixed files are no longer proguard.cfg, but Project.Properties and Proguard-project.txt.When you create a new project, the Project.Properties and Proguard-project.txt files are automatically generated, and you do not need to create your own, and if your project is not automatically ge
When we compile the user version of the Android system, sometimes there will be proguard errors, in resolving this error, we need to know some knowledge:What is 1,proguard used for?Simply put, he is a tool used to confuse Java code.2, where is this thing implemented?We generally support it in the Android.mk file, such as:1) Specify the Proguard.flags file for native methods and variables that do not need to be confused local_proguard_flag_files: = Pro
To prevent code decompilation, android introduces the concept of obfuscation code.
1. Set ObfuscationFind the project. properties file under the project.
Add proguard. config =$ {sdk. dir}/tools/proguard/proguard-android.txt in the file: proguard-project.txt this is the system
You can also use your own obfuscation file
Android code obfuscation and project release steps recordOriginally compiled a copy of the Android project to confuse and publish the document, suddenly think of why not write a blog, share it, if it has this article.Android code obfuscation and project release steps recordFirst, clean up the debugging information in t
Originally put together the Android project was confused with the published file. I suddenly thought, why not write blog, share. There are cases of this article.Android code obfuscation and project announcement step recordFirst, clean up the debugging information in the code, such as log, System.outSecond, change the version number in the manifest file to the cur
article Windows x86 Seh Learning, it should be explained that the compiler implementation of SEH and ordinary is not the same.0x05 Destroy stack frame analysisIda tries to parse a function to determine its stack frame structure, especially when it encounters a ret/retn to reach the end of a function, so it is easy to forge stack frames to prevent static analysis. Add a RET 0xff to the previous codeThe results of Ida F5 are considered to have 63 parameters.There is also the change in the value o
Android code obfuscation-so simpleA xxx.apk is submitted to the test,OK, go get a glass of water and look at the Web ~~~~~Well, suddenly I think it's better to give my code a bit more security,Remember to see the APK can be extracted directly, and then it is easy to decompile. javaLooked for, sure enough, all this is just a minute thing,1. Get classes.dex files;
just. sh This script file run permissions, because the default is not this permission, enter the following command in the terminal:Open Run PermissionsEnter, fix it, go back to our project, COMMAND + B to compile the project, and then untie the code we just commented out:Open the code we just commented outCommand + b Again, is it a compile now? Just an error, now solved!Basically, all that's left is to add
Received a new task to confuse existing projects with code. There has been some understanding of confusion before, but it's not detailed and complete, and it's tricky to know something is confusing. But fortunately the current project is not too complex (for the confusion of this piece), completed in advance ~ ~ Now summed up.
First part
Introduction to the operating process (Eclipse):
1. Open obfuscation
already here: Code obfuscation is generally through a variety of means to confuse the code execution process, put in this article, as long as the exception_continue_execution return address can be modified (note my words, is exception_ The return address of the continue_execution is not the return address of the exception, and if it is remembered that the return
Two tools are required to decompile and view the source code: Dex2jar and JdguiDex2jar (Google Code)Jdgui (Google code), the latest version please see the officialThe operation is simple and the steps are as follows:1. Copy the APK (e.g. guessstock.apk) to the Dex2jar directory and execute it under cmd:C:\users\raozf\desktop\dex2jar-0.0.9.15>d2j-dex2jar.bat guess
The first step: code obfuscation (note the introduction of the Third-party jar)
When you create a project in a new version of ADT, the files for the mixed code are no longer proguard.cfg, but Project.Properties and Proguard-project.txt.
When you create a new project, you automatically generate project.properties and proguard-project.txt files without creating y
Because Android code is mostly Java code, it is easy to decompile, fortunately, Android ADT for us to integrate the tool of confusing code, one can confuse our code, so that the program is anti-compilation after the basic understanding, but also can play the role of code opt
The code to confuse the APK is as follows:(1) Locate the Project.Properties file in the project, and after configuring the target property, addProguard.config=proguard-project.txt This property, You can confuse the code. (2) If you need to specify a specific class that does not require code obfuscation, in the Proguard
Android Code obfuscationIn Build.grandle Add, where rules are written in Proguard-rules.pro, you can also customize a file to replace it, such as Eclipse's common Proguard-project.txtbuildTypes { release { signingConfig signingConfigs.release minifyEnabled true proguardFiles getDefaultProguardFile(‘proguard-android.txt‘), ‘proguard-rules.pro‘ }}Add the following code to the Proguard-rules.pro to
just. sh This script file run permissions, because the default is not this permission, enter the following command in the terminal:Open Run PermissionsEnter, fix it, go back to our project, COMMAND + B to compile the project, and then untie the code we just commented out:Open the code we just commented outCommand + b Again, is it a compile now? Just an error, now solved!Basically, all that's left is to add
Originally compiled a copy of the Android project to confuse and publish the document, suddenly think of why not write a blog, share it, if it has this article.Android code obfuscation and project release steps recordFirst, clean up the debugging information in the code, such as log, System.outSecond, modify the version in the manifest file to the current version
To achieve code obfuscation, the method is as follows:
Because both my SDK and adt00000.1 are up-to-date, I have read the proguard. cfg obfuscation code method provided on the Internet,. It is said that proguard. cfg will be automatically generated under the project file, but I cannot generate it, so I cannot use this
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembl
After studying the mixed packaging of the android apk signature and code, if not, the apk can be decompiled directly to view the source code. Although the mixed packaging can still be understood, but it's not that easy to understand. At least it takes some time to pay for it.
If not obfuscated, The decompiled code is as follows:
Basically, it is the source
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.