I saw a really awesome 3D dynamic weather forecast on Android play a while ago, and it was very cool. Apart hands Dex2jar.bat/apktool found out that it didn't
What eggs are used, see the native field in the core to decisively abandon the treatment, and immediately turn to so's reverse project. Found the COCOS2DX so engine, search karma. I told you.
So cool effect, Android source code is not done. Even if this is achieved, performance is expected to be particularly bad. Because that dynamic effect is not looped back
, which is not repeated. is the self-drawn according to the resource file, under the anti-compilation assets found such as the following a large heap of files
Eliminate the possibility of PNG loading cool 3D dynamic effects. The answer is very obvious, it is these prv.ccz/plist files, these two files are cocos2dx used to load
The rendering effect of the resource file, plist equivalent to the key, and PRV.CCZ inside the corresponding value is a set of resource photos. This time I was Baidu opened this file to the side
Texturepacker to open such a file. After downloading, click on the PVR Viewer button. Popup such as the following tips
Suddenly dumbfounded.
。。
。 Then find the information online. is known on the basis of the tuned function of so. The COCOS2DX engine needs to verify this key before rendering the above file
OK, I'm more than cool. Because I usually have nothing to like to visit the forum AH. Do crack ah what, these are hard not to pour me, open dry!
Picked up my test to kiss my son's tablet,
Started my reverse, first teach you a method adb port forwarding. Ida Android_server Synchronous monitoring. Are you very confused? All right, say something specific.
Author Development tools:
Ida 6.6 Cracked version number
ADT 22.3
Reverse real-Machine Nexus 7-2
After you download Ida, go to the file for example by path of the slice
Plug in the real USB, push the file to/data/local/tmp/, then launch it, push requires root, such as read-only access, run
Remount, or not. Run the SU command. in Mount
#adb remount//as Read-only file system
#adb Shell
#su//root access required
#mount-O-RW, remount-t yaffs2/data need to be in./Down
After you get the permissions, push Android_server to/data/local/tmp
and start
#./android_server//Direct return
IDA Android 32-bit Remote debug Server (ST) v1.17. Hex-rays (c) 2004-2014
Listening on port #23946 ...
=========================================================
[1] Accepting connection from 127.0.0.1 ...
[1] Incompatible IDA version
[1] Closing connection from 127.0.0.1 ...
=========================================================
[2] Accepting connection from 127.0.0.1 ...
[2] Incompatible IDA version
[2] Closing connection from 127.0.0.1 ...
The above hint shows that the work of the real machine deployment has been completed, the rest is to open attach debugging
Next, open your Ida. Open the so source file you want to debug, click debugger->attach->remote armlinux/andoid Debugger, set hostname to localhost. Port is 23946, click OK, then select the app you want to debug and click OK
Assuming no breakpoint debugging is occurring, check to see if the project process you want to reverse has entered debug mode. No manual such as the following command
adb shell am start-d-N Package name/package name. Entry Activity //Enter
A DOS type is turned on, such as the following command, to forward the Android device listener port to the local Ida
After entering Ida F5, enter debug mode ctrl+f the next unit. F9Continue Process, Ctrl + F5 Show all, enter debug mode, random ctrl+5 so library files are loaded into log such as the following
Go ahead and verify that the render file 128 is the password function, which is what I want to steal, information such as the following
Remove the hexadecimal identifier to combine it:
a518f2dc139bfef5f8dc9f635cdb8a9a
It is then entered into the Texturepacker software, all as I expected, perfectly cracked
The reverse of the Prv.ccz file is complete. The rest is the reverse so important function call, the whole process took 5 days. Just cracked the apk on the 2 online market, using the off-duty
breaking time. On the reverse of the core part I will not say, because I have selfish, I would like to continue to write code on its basis. Become your own in good condition. Haha, a little cheap feeling ...
By the Way, please. Windows software can still reverse, just disassembly is rather troublesome, project volume is very large!
Interested in having access to IDA-related information
The next goal is to reverse an offline speech synthesis engine, which is quite difficult.。 Because I have not progressed for 4 days ...
Alas, the heart that sour!And then out of the book again!
Tsinghua University Press signed, afraid of fraught, so very attentively. It's written very intently. I hope you will be more publicity, thank you for your view
Bo!
Optimized cache files such as Android COCOS2DX engine prv.ccz/plist/so, hands-on Ida teaches you reverse project Decompile apk Library and other files