recently has been studying code obfuscation, which found a problem, we define some common constants after the code is confused, after the anti-compilation, even after the full display in front of my eyes, such as the service request address, unexpectedly in the form of a full path is displayed in the confusion of the code
When we compile the user version of the Android system, sometimes there will be proguard errors, in resolving this error, we need to know some knowledge:What is 1,proguard used for?Simply put, he is a tool used to confuse Java code.2, where is this thing implemented?We generally support it in the Android.mk file, such as:1) Specify the Proguard.flags file for native methods and variables that do not need to be confused local_proguard_flag_files: = Pro
Android code obfuscation and project release steps recordOriginally compiled a copy of the Android project to confuse and publish the document, suddenly think of why not write a blog, share it, if it has this article.Android code obfuscation and project release steps recordFirst, clean up the debugging information in t
Originally put together the Android project was confused with the published file. I suddenly thought, why not write blog, share. There are cases of this article.Android code obfuscation and project announcement step recordFirst, clean up the debugging information in the code, such as log, System.outSecond, change the version number in the manifest file to the cur
1. Start the obfuscation switchIn the project directory under the Project.Properties file, known as the proguard.config tag, the default is the off state, open. 2. Confusing configurationIn the project directory under the Proguard-project.txt file for specific confusion configuration, after configuration right click on the project, select Export exported apk package, the APK package is a confusing package.Example: Package named Com.test
-dont
just. sh This script file run permissions, because the default is not this permission, enter the following command in the terminal:Open Run PermissionsEnter, fix it, go back to our project, COMMAND + B to compile the project, and then untie the code we just commented out:Open the code we just commented outCommand + b Again, is it a compile now? Just an error, now solved!Basically, all that's left is to add
already here: Code obfuscation is generally through a variety of means to confuse the code execution process, put in this article, as long as the exception_continue_execution return address can be modified (note my words, is exception_ The return address of the continue_execution is not the return address of the exception, and if it is remembered that the return
The code to confuse the APK is as follows:(1) Locate the Project.Properties file in the project, and after configuring the target property, addProguard.config=proguard-project.txt This property, You can confuse the code. (2) If you need to specify a specific class that does not require code obfuscation, in the Proguard
Android Code obfuscationIn Build.grandle Add, where rules are written in Proguard-rules.pro, you can also customize a file to replace it, such as Eclipse's common Proguard-project.txtbuildTypes { release { signingConfig signingConfigs.release minifyEnabled true proguardFiles getDefaultProguardFile(‘proguard-android.txt‘), ‘proguard-rules.pro‘ }}Add the following code to the Proguard-rules.pro to
Originally compiled a copy of the Android project to confuse and publish the document, suddenly think of why not write a blog, share it, if it has this article.Android code obfuscation and project release steps recordFirst, clean up the debugging information in the code, such as log, System.outSecond, modify the version in the manifest file to the current version
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembl
Android code obfuscation 1 proguard. cfg. This is the proguard script required for obfuscation. The Code is as follows: [java] view plain-optimizationpasses 5-dontusemixedcaseclassnames-dontskipnonpubliclibraryclasses-dontpreverify-verbose-optimizations! Code/simplification/
We can use the Classdump to dump the original program, like the previous article (Class-dump installation and use of records (export the application's header file), we can see all the. h files are completely exposed (e.g.)After clicking on the HWAccount.h, the function name and the property name are the same:This is the equivalent of being in a bare-Ben, and we need to confuse the code. To put it simply, it is to make your username and function name i
-Injars ruyicai. jar // jar package to be obfuscated-outjars ruyicai-out.jar // The jar package to be output after obfuscation // reference the dependent jar package-libraryjars 'C: \ Program Files \ Java \ jdk1.6.0 _ 43 \ jre \ lib \ rt. jar '... ...-Libraryjars libs \ weibo-1.2.jar-optimizationpasses 5-dontusemixedcaseclassnames-dontskipnonpubliclibraryclasses-dontpreverify-verbose-optimizations! Code/sim
By default, Android projects in Eclipse use Proguard (http://proguard.sourceforge.net/) to confuse project code files.The usage is simple:1. Add proguard. config = proguard. cfg to the default. properties file.2. Configure the proguard parameter in Proguard. cfg. (If this file is not available, create one in the src directory .)3. Export the apk file to get the mixed file.The method described above is simple and can be used simply by simple settings.I
. NET obfuscation Dotfuscator provides powerful tamper defense and prompt functionality to effectively detect tampering, inject fact-tampering defenses, and automate incident management and response. This article mainly describes how to use. NET code obfuscation Dotfuscator detects tampering with the application. Dotfuscator contains a tamper detection tool that
. NET obfuscation Dotfuscator provides powerful tamper defense and prompt functionality to effectively detect tampering, inject fact-tampering defenses, and automate incident management and response. This article mainly describes how to use. NET code obfuscation Dotfuscator detects tampering with the application.Dotfuscator contains a tamper detection tool that i
just. sh This script file run permissions, because the default is not this permission, enter the following command in the terminal:Open Run PermissionsEnter, fix it, go back to our project, COMMAND + B to compile the project, and then untie the code we just commented out:Open the code we just commented outCommand + b Again, is it a compile now? Just an error, now solved!Basically, all that's left is to add
After studying the mixed packaging of the android apk signature and code, if not, the apk can be decompiled directly to view the source code. Although the mixed packaging can still be understood, but it's not that easy to understand. At least it takes some time to pay for it.
If not obfuscated, The decompiled code is as follows:
Basically, it is the source
Php code obfuscation solution because the source code cannot be written, which of the following pictures can be sent to the boss to help write a local environment dedicated to decryption ------ solution ------------------ lt ;? Phpecho lt; meta nbsp; http-equivContent-Type nbsp; contenttext php code
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.