Android package key password lost retrieval, androidkey password lost
I was going to release a new version for my application yesterday. When I packed the apk, I found that my previous keystore password was forgotten. I tried all the passwords I could think of. Note: I usually use the combination of letters and numbers as passwords for registration on various portal websites. Until half past one in the morning, the dead are all there.
Google and Baidu searched every day and did not find a solution. The experts on Stackoverflow said that there are only two solutions: 1. come up with the password; 2. modify the package name, generate a new keystore, and release a new application.
Later, I saw a link from zhihu. I tried it and checked it out. The result is OK!
Share the following experience:
[Software]: Android Keystore Password Recovery
[Site]: https://code.google.com/p/android-keystore-password-recover/
[Runtime Environment]: JDK7
Download jar package: https://drive.google.com/file/d/0B_Rw7kNjv3BATldrLXMwcVRud2c/edit? Usp = sharing. It has been tried multiple times to prove that it has been dropped by tianchao and can only be downloaded by FQ. Download AndroidKeystoreBrute_v1.05.jar
The official website provides 3 methods to crack the password:
1 |
There are 3 Methods to recover your keystore password: |
2 |
-Simply Bruteforce (simple brute force cracking) |
3 |
-Dictionary Attack (Dictionary cracking) |
4 |
-Smart Wordlist Attack (Smart word list cracking): poor English, literally translated! |
Usage:
02 |
java -jar AndroidKeystoreBrute.jar <args> |
05 |
-k <path> path to your keystore |
06 |
-d <path> dictionary ( for method 2 and 3 ) |
07 |
-p use common replacements like '@' for 'a' ( for method 3 ) WARNING - very slow!! |
08 |
-start <String> sets the start String for the password ( for brute force) |
09 |
-w writes a new keystore with same password than the key |
11 |
example for brute-force attack |
12 |
java -jar AndroidKeystoreBrute_v1. 05 .jar -m 1 -k <...keystore> -start AAAAAA |
13 |
example for dictionary attack |
14 |
java -jar AndroidKeystoreBrute_v1. 05 .jar -m 2 -k "C:\\mykeystore.keystore" -d "wordlist.txt" |
15 |
example for smart wordlist attack (recommend) |
17 |
java -jar AndroidKeystoreBrute_v1. 05 .jar -m 3 -k "C:\\mykeystore.keystore" -d "wordlist.txt" |
At first, I used method 1. I ran for a night and didn't finish it. The default letter combination has too many passwords. It is too embarrassing to use this method to crack the password.
Later, I tried to use method 3. In fact, I did not pay attention to it. I officially recommended method 3: Create a TXT file first, such as passlib.txt: enter your frequently used phrase for password setting in the text document, or you can vaguely remember the words you may have used when creating them, and write down all the words you can think:
Then execute:
1 |
java -jar AndroidKeystoreBrute_v1. 05 .jar -m 3 -k "C:\\mykeystore.keystore" -d "passlib.txt" |
If the phrase in passlib.txt you created exists in your keystore password, it is an instant to retrieve the password:
My execution results:
1 |
Got Password in 0 seconds |
2 |
Password is: android521 for alias ldxxfirstapp |
Note: When the command line executes the java-jar command, the root directory must be the directory where AndroidKeystoreBrute_v1.05.jar is located, for example, AndroidKeystoreBrute_v1.05.jar is placed under C: \ key \ androidkeystorebrute_v1.05: \ key is then executed; otherwise, an error is reported.
Android packaging problems
Eclipse will be automatically packaged. in the bin directory of the project, there is an apk for your project. This file can be directly used
Android packaging always reports an error. Help
Most of the problems are caused by the jar you reference. Some jar may have the same content.