I. Preface
At present, the Android market is flooded with a large number of pirated software, and developers' official applications are maliciously tampered with by the "package party. How to protect the program code from pirated tampering has become a top priority for developers, today we will analyze a good solution-Zookeeper reinforcement (http://www.secneo.com/appProtect ).
Reinforce and protect apps. Zookeeper can effectively prevent mobile applications from being cracked, pirated, repacka
The term reverse engineering may be very unfamiliar to many people, in the Android field, we often hear "anti-compilation of an APK", then reverse engineering from a certain point of view also includes the anti-compilation technology, such a contrast, it may be easier for us
Google official provides apktool can reverse has been released APK application, that is, the reverse compilation has been packaged successfully apk files, use it can be compiled into a very close to the original packaging before the format, for APK, can be specific
The reverse of the Android APK program is much simpler than the reverse of the windowsPE file.1. Android APK program is actually a zip, can be opened with WinRAR, extract will see a very familiar directory, there are androidmanifest.xml files, various resources and pictures2.xml Open With Notepad, you will see garbled,
-read or modify binary code, so there is tools out there to convert to and from a human readable Representation. The most common human readable format is known as Smali.
But the platform doesn ' t know anything about Smali, it's just a tool-to-make it easier-work with the bytecode.
2. Signapk.jarSignapk.jar is the Android SDK comes with a tool that uses Android's own Signapk.jar +. X509.pem +. Pk8 signing application. This is more than a year ago wrote the summary, now can't find the di
Lobotomy: Android Reverse Engineering Framework (Part1)
If you have followed the previous articles on Android security, you should be familiar with rotlogix. He is keen on the mobile security business and plays a binary role. This series of articles is a guide to his own Lobotomy framework. This framework can also be said to be the accumulation of technology by rotlogix!
Many articles on his personal blog
Now the main tool is to contact the SDK, in order to prevent the game pack to be cracked compiled, as well as find the encryption string, I would share the following points:There are four main ways to implement anti-cracking technology:1. Code obfuscation (Proguard) technology2. Signature Alignment Technology3.NDK. So dynamic Library technology4. Dynamic Loading Technology5. Third-party platform encryption and detection vulnerabilitiesThis article also mentions the relevant knowledge points in t
SECCON 2015 CTF Selection: A 400-point Android APK reverse question | focus on hackers and geeks
This is the second question of "Android APK reverse" in the SECCON 2015 CTF challenge, with a score of 400. The prompt is: "The key is stored in the application, but you need to hack the server ."
First, I installed the
the user name and serial number input box, "lisence correct!" is displayed !". For example:
2. Reverse conversion-Write the registration server
Reading the smali code of the F1 and F2 functions does not repeat any more. This only requires patience, because the decompiled smali code has many jumps and is relatively difficult to read, however, it is easier to understand than assembly. The following lists the Java code of the two F1 and F2 functions use
shared my experience with you. By the way, I used it as my graduation thesis materials ~
PS: the technology, data, and interface addresses involved in this series of articles are for learning and communication only. Do not do anything bad! Otherwise, you are at your own risk!
Reverse Engineering
Code Framework Analysis
TcpDump packet capture
WireShake analyze data packets
This article describes how to reverse an android APK application. The method provided in this article is only for research and learning.
The tools required in this article are:
JDK is used to build a Java Runtime Environment.
Axmlprinter2.jar: Used to reverse the. xml file.
Baksmali. jar is used to reverse the classex
Talking about Android Application protection (I): The basic method for reverse engineering of Android applications, and talking about android
There are many methods and ideas for unprotected Android apps to conduct Reverse Analysis and attacks. By using some basic methods, you can break the confidentiality and integrity that are very important to application secu
Now the main tool is to touch the SDK, in order to prevent the game pack from being cracked compiled, and to discover the encrypted string, I would like to share the following points: anti-cracking technology is mainly four ways to achieve: 1. Code obfuscation (Proguard) technology 2. Technology Dynamic Library Technology of signature comparison 4. Dynamic loading Technology 5. Third-party platform encryption and detection vulnerability this Android security how to decompile and encrypt
Android Reverse engineer-1 https://www.cnblogs.com/cuihengchaliao/p/6661871.html mentions the modified repackaged apk file, which needs to be re-signed before it can be installed.Re-signing, if it is the normal way of modification, the original version of the signing certificate can be used; but if it is not the normal way of the APK package modification, re-sign
Recently looked at the reverse engineering of Android, cracked books, such as "Android Hack's book" and the like, feel very interesting, look at some Smali grammar, try to write a demo of their own to play:1. Tools:Latest version of apktool2.0:http://connortumbleson.com/2015/04/20/apktool-v2-0-0-released/Installation method in: http://ibotpeaches.github.io/Apktool/install/
monitor the user's actions (more than 4.0)Entrance activity,OnCreate ()working with interactions on the home pageParent activity (Primary)Call the OnCreate () method of the parent class:OnCreate () of the parent class is analyzed belowNote: I mainly analyze the process "the impact of important actions in the app", so only in the main line of code analysis, as for the bypass branch please read the code by themselves.From the See Navigationitemlist contains 6 classes are 6 functions on the proces
In October 2004, IBM unveiled the visual modeling tools that support the latest UML2.0, rational Software Architect (see annotation ①) and IBM Rational Software Modeler (see note ②). While they support better improvements in modeling capabilities and support for newer standards, RSA's wonderful features are focused on support for Java applications, while IBM Rational Software Modeler is a major focus on the system's model design, if you want to analyze the structure of C + + Code for the system,
Reverse engineering (Reverse Engineer) is the ability to generate models from the code of an existing system. The main purpose of analyzing existing code is to understand the code structure and data structure, which correspond to the model diagram is class diagram, data Model Diagram and component diagram (the description of UML various model diagrams see annotat
The android project is an APK package. This section contains the compiled code and resource files.
For reverse engineering of the resource file, see Brief Analysis of Information in the APK file.
The compiled code requires two tools:
Dex2jar, used to convert Dex files to jar files;
JD-Gui:
Online about from C + + code to UML class diagram generation process of things, found a usable, and now turn down, in case of a rainy days.Turn to slightly adjust the next content, only care about the use.Original source http://siulyn.blog.163.com/blog/static/6245583620087252539344Rational Rose 2003 Reverse engineering generating UML Model diagramThis section focuses on how users can use Rose's
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.