A simple shell removal instance (dex) and shell removal dex
I just finished my work and just analyzed a reinforced game. I remembered that I didn't send an analysis process in the last post and recorded a video, Here is a simple addition. For the new version of this shell, there are also tutorials on the Internet, the dex has been removed successfully, and you will have time to make another video later. Previous: Android learning Manual Http://www.52pojie.cn/thread-280588-1-1.html
The operation in this article is mainly to analyze the dedex instance of this software. Some students read the last post and fail to take dex off. Therefore, a video is recorded to introduce the process. In this video, the main operation is to take dex off. As for how to make the original software package normally after taking dex off, I will not describe it. If you are interested in shelling and can easily use IDA, you can search for relevant knowledge first.
Video and original package address:
Link: http://pan.baidu.com/s/1c0b89e4 password: k31x
|
How does android dex file protection work? How can I hide dex shells? How to implement it?
The source code hiding encryption technology proposed by love encryption is to hide dex, and then generate a shell file, similar to a virtual image. If a hacker wants to steal the source code, there will be no substantive source code. This protection is very effective.