Optimized cache files such as Android COCOS2DX engine prv.ccz/plist/so, hands-on Ida teaches you reverse project Decompile apk Library and other files

Source: Internet
Author: User
Tags root access

I saw a really awesome 3D dynamic weather forecast on Android play a while ago, and it was very cool. Apart hands Dex2jar.bat/apktool found out that it didn't

What eggs are used, see the native field in the core to decisively abandon the treatment, and immediately turn to so's reverse project. Found the COCOS2DX so engine, search karma. I told you.

So cool effect, Android source code is not done. Even if this is achieved, performance is expected to be particularly bad. Because that dynamic effect is not looped back

, which is not repeated. is the self-drawn according to the resource file, under the anti-compilation assets found such as the following a large heap of files



Eliminate the possibility of PNG loading cool 3D dynamic effects. The answer is very obvious, it is these prv.ccz/plist files, these two files are cocos2dx used to load

The rendering effect of the resource file, plist equivalent to the key, and PRV.CCZ inside the corresponding value is a set of resource photos. This time I was Baidu opened this file to the side

Texturepacker to open such a file. After downloading, click on the PVR Viewer button. Popup such as the following tips


Suddenly dumbfounded.

。。

。 Then find the information online. is known on the basis of the tuned function of so. The COCOS2DX engine needs to verify this key before rendering the above file

OK, I'm more than cool. Because I usually have nothing to like to visit the forum AH. Do crack ah what, these are hard not to pour me, open dry!

Picked up my test to kiss my son's tablet,

Started my reverse, first teach you a method adb port forwarding. Ida Android_server Synchronous monitoring. Are you very confused? All right, say something specific.

Author Development tools:

Ida 6.6 Cracked version number

ADT 22.3

Reverse real-Machine Nexus 7-2

After you download Ida, go to the file for example by path of the slice



Plug in the real USB, push the file to/data/local/tmp/, then launch it, push requires root, such as read-only access, run

Remount, or not. Run the SU command. in Mount

#adb remount//as Read-only file system

#adb Shell

#su//root access required

#mount-O-RW, remount-t yaffs2/data need to be in./Down

After you get the permissions, push Android_server to/data/local/tmp

and start

#./android_server//Direct return

IDA Android 32-bit Remote debug Server (ST) v1.17. Hex-rays (c) 2004-2014
Listening on port #23946 ...
=========================================================
[1] Accepting connection from 127.0.0.1 ...
[1] Incompatible IDA version
[1] Closing connection from 127.0.0.1 ...
=========================================================
[2] Accepting connection from 127.0.0.1 ...
[2] Incompatible IDA version
[2] Closing connection from 127.0.0.1 ...

The above hint shows that the work of the real machine deployment has been completed, the rest is to open attach debugging

Next, open your Ida. Open the so source file you want to debug, click debugger->attach->remote armlinux/andoid Debugger, set hostname to localhost. Port is 23946, click OK, then select the app you want to debug and click OK

Assuming no breakpoint debugging is occurring, check to see if the project process you want to reverse has entered debug mode. No manual such as the following command

adb shell am start-d-N Package name/package name. Entry Activity //Enter

A DOS type is turned on, such as the following command, to forward the Android device listener port to the local Ida


After entering Ida F5, enter debug mode ctrl+f the next unit. F9Continue Process, Ctrl + F5 Show all, enter debug mode, random ctrl+5 so library files are loaded into log such as the following


Go ahead and verify that the render file 128 is the password function, which is what I want to steal, information such as the following



Remove the hexadecimal identifier to combine it:

a518f2dc139bfef5f8dc9f635cdb8a9a
It is then entered into the Texturepacker software, all as I expected, perfectly cracked
The reverse of the Prv.ccz file is complete. The rest is the reverse so important function call, the whole process took 5 days. Just cracked the apk on the 2 online market, using the off-duty
breaking time. On the reverse of the core part I will not say, because I have selfish, I would like to continue to write code on its basis. Become your own in good condition. Haha, a little cheap feeling ...


By the Way, please. Windows software can still reverse, just disassembly is rather troublesome, project volume is very large!

Interested in having access to IDA-related information


The next goal is to reverse an offline speech synthesis engine, which is quite difficult.

。 Because I have not progressed for 4 days ...


Alas, the heart that sour!

And then out of the book again!

Tsinghua University Press signed, afraid of fraught, so very attentively. It's written very intently. I hope you will be more publicity, thank you for your view


Bo!

Optimized cache files such as Android COCOS2DX engine prv.ccz/plist/so, hands-on Ida teaches you reverse project Decompile apk Library and other files

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.