Android package key password lost retrieval, androidkey password lost

Source: Internet
Author: User

Android package key password lost retrieval, androidkey password lost

I was going to release a new version for my application yesterday. When I packed the apk, I found that my previous keystore password was forgotten. I tried all the passwords I could think of. Note: I usually use the combination of letters and numbers as passwords for registration on various portal websites. Until half past one in the morning, the dead are all there.
Google and Baidu searched every day and did not find a solution. The experts on Stackoverflow said that there are only two solutions: 1. come up with the password; 2. modify the package name, generate a new keystore, and release a new application.
Later, I saw a link from zhihu. I tried it and checked it out. The result is OK!
Share the following experience:

[Software]: Android Keystore Password Recovery
[Site]: https://code.google.com/p/android-keystore-password-recover/

[Runtime Environment]: JDK7

Download jar package: https://drive.google.com/file/d/0B_Rw7kNjv3BATldrLXMwcVRud2c/edit? Usp = sharing. It has been tried multiple times to prove that it has been dropped by tianchao and can only be downloaded by FQ. Download AndroidKeystoreBrute_v1.05.jar
The official website provides 3 methods to crack the password:

1 There are 3 Methods to recover your keystore password:
2 -Simply Bruteforce (simple brute force cracking)
3 -Dictionary Attack (Dictionary cracking)
4 -Smart Wordlist Attack (Smart word list cracking): poor English, literally translated!

Usage:

01 execute with
02 java -jar AndroidKeystoreBrute.jar <args>
03 possible args
04 -m <1..3> Method
05 -k <path>  path to your keystore
06 -d <path> dictionary (for method 2 and 3)
07 -p use common replacements like '@' for 'a'(for method 3) WARNING - very slow!!
08 -start <String> sets the start String for the password (for brute force)
09 -w writes a new keystore with same password than the key
10 -h prints helpscreen
11 example for brute-force attack
12 java -jar AndroidKeystoreBrute_v1.05.jar -m 1 -k <...keystore> -start AAAAAA
13 example for dictionary attack
14 java -jar AndroidKeystoreBrute_v1.05.jar -m 2 -k "C:\\mykeystore.keystore" -d "wordlist.txt"
15 example for smart wordlist attack (recommend)
16  
17 java -jar AndroidKeystoreBrute_v1.05.jar -m 3 -k "C:\\mykeystore.keystore" -d "wordlist.txt"

At first, I used method 1. I ran for a night and didn't finish it. The default letter combination has too many passwords. It is too embarrassing to use this method to crack the password.
Later, I tried to use method 3. In fact, I did not pay attention to it. I officially recommended method 3: Create a TXT file first, such as passlib.txt: enter your frequently used phrase for password setting in the text document, or you can vaguely remember the words you may have used when creating them, and write down all the words you can think:

1 helloworld
2          ILoveYou
3          java
4          android
5          com.ldxx.firstapp

Then execute:

1 java -jar AndroidKeystoreBrute_v1.05.jar -m 3 -k "C:\\mykeystore.keystore" -d "passlib.txt"

If the phrase in passlib.txt you created exists in your keystore password, it is an instant to retrieve the password:

My execution results:

1 Got Password in 0 seconds
2      Password is: android521 for alias ldxxfirstapp

Note: When the command line executes the java-jar command, the root directory must be the directory where AndroidKeystoreBrute_v1.05.jar is located, for example, AndroidKeystoreBrute_v1.05.jar is placed under C: \ key \ androidkeystorebrute_v1.05: \ key is then executed; otherwise, an error is reported.


Android packaging problems

Eclipse will be automatically packaged. in the bin directory of the project, there is an apk for your project. This file can be directly used

Android packaging always reports an error. Help

Most of the problems are caused by the jar you reference. Some jar may have the same content.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.