First, use the compression software to open the APK, get five files or folders
1, Meta-inf
2, Res
3, Androidmanifest.xml
4, Classes.dex
5, RESOURCES.ARSC
Second, the XML file is compressed, you can use AXMLPrinter2 open
Third, RESOURCES.ARSC saved is compiled binary files, many of the people who do Chinese software are modified by the file resources to achieve.
Iv. for the Classes.dex file, it is Java source code compiled by the bytecode file, can be Dex2jar decompile, and then use the Jd-gui tool to decompile the jar file into a Java file
Can not be modified by anti-compilation software, because the Meta-inf folder is stored in the software's signature information, to ensure the integrity of the APK package and system security. When the software is installed, the app manager verifies the APK, and if the checksum information is inconsistent with the Meta-inf, the installation will be rejected.
Professional developers will encapsulate important information in the so file, which cannot be deserialized.
Android APK Reverse engineering file directory Introduction