After a busy week and finally having time to write something, we continue to introduce another way for Android APK to prevent anti-compilation technology. Top two we talked about Shell technology (http://my.oschina.net/u/2323218/blog/393372) and runtime modification bytecode (http://my.oschina.net/u/2323218/blog/396203) , if there is something you can see in the first two articles of my blog about both of these technologies. Next we will introduce ano
After a busy week and finally having time to write something, we continue to introduce another way for Android APK to prevent anti-compilation technology. Top two we talked about Shell technology (http://my.oschina.net/u/2323218/blog/393372) and runtime modification bytecode (http://my.oschina.net/u/2323218/blog/396203) , if there is something you can see in the first two articles of my blog about both of these technologies. Next we will introduce ano
After a busy week and finally having time to write something, we continue to introduce another way for Android APK to prevent anti-compilation technology. The first two we talked about the shell technology and the runtime to modify the bytecode, if there is not clear can see my blog in the first two of the introduction of these two technologies. Next we will introduce another easy-to-use technology that prevents a
app Cottage Crazy Love encryption APK encryption platform anti-cracking, Android system because of its open source, now occupy the global Smart machine near 80% WP system and Apple's ios system. However, it is also due to open source, android piracy app app through advertising harassment, theft of accounts, theft of privacy, remote control, malici
Love encryption Android APK shell principle Analysisfirst, what is the Packers? Packers are a piece of code that is implanted in a binary program, giving priority to the control of the program at run time and doing some extra work. Most viruses are based on this principle. The process of adding a shell to a PC EXE file is as follows:second, the role of adding shellsShell procedures can effectively prevent t
is destroyed, so you want to unzip it or view will prompt the file is corrupted, with the anti-compilation tool will also prompt the file is corrupted, However, it does not affect the normal operation and installation of the Android system and is compatible with all systems.But this apk compression package destroys the same problem as the APK pseudo-
Decompile apk and apk decompile Tool
Decompile the source code and images, XML configuration, language resources, and other files of the apk Generation Program.
This is especially useful if it is just a Chinese software.
First, download the tool. This time, apktool is use
Pseudo-Encryption 1:APK open requires passwordGenesis: Modify the ZIP header, set the encryption flag of the file to ture, and restore the encryption flag to false. Using the android processing zip file does not judge the head of the encryption information, other compression
See good technical tutorials just want to reprint, do not like to spray! Thanks for the cooperation, only for rookie study study, do not do bad oh \ (^o^)/~ 1. Encrypt apk. Here I'm using love encryption from the project Bin directory under copy apk file upload to love encrypted website encryption while downloading the
First Step encryption:1. The meaning of encryptionIf the software is not encrypted it is easy to be anti-compilation caused by the source code leaks, to find out the address of the server and indirectly received attacks, such as a series of problems.2. Methods of encryptioncan use Love encrypted URL: http://www.ijiami.cn/ apk encryption, which is provided by the
the text starts with the numberingNote: QQ group number 296733909(Background introduction and the like to skip the good) development of Android applications will inevitably need to write Java code, but the Java write application is not secure, you can use the Android Reverse helper and other tools, easy to decompile the APK package, to view the APK package source code, Then there is the obfuscation
Pseudo-Encryption 1:APK open requires password Genesis: Modify the ZIP header, set the encryption flag of the file to ture, and restore the encryption flag to false. Using the android processing zip file does not judge the head of the encryption information, other compressio
Pseudo-Encryption 1:APK open requires passwordGenesis: Modify the ZIP header, set the encryption flag of the file to ture, and restore the encryption flag to false. Using the android processing zip file does not judge the head of the encryption information, other compression
Tool name, Introduction and :Apktool (get resource file)Function: Get the resource file, can extract the picture file and layout file for use view.Download Address:Dex2jar ( get source files)Role: Decompile the apk into Java source code (Classes.dex into a jar file).:Jd-gui( view source) Role: View the apk in the Classes.dex converted into a jar file, namely the
[Tool] apk decompile tool JADX use a. Download
1. Tools downloadDownload Address: Https://bintray.com/skylot/jadx/releases#files (but may not be up to date)2. SOURCE downloadDownload Address: HTTPS://GITHUB.COM/SKYLOT/JADX two. Source Code compilation
After downloading the source code after the decompression, into the directory to execute the command:
git clone
the Dexcode, you can replace the instruction. The implementation is as follows:?
123456789101112131415161718192021222324252627
Constdexcode*code=dexfindclassmethod (gDexFile , "Lcom/android/dex/myclass;", "Setflaghidden");constdexcode*code2= dexfindclassmethod (gDexFile, "lcom/android/dex/myclass;", "Setflag"); NBSP;NBSP;NBSP;NBSP;//NBSP;REMAP!!!! if (Mprotect (base,module_size,prot_read|prot_write |prot_exec) ==0) {dexcode*pcode= ( dexcode*) code2;//modify! pcode->registers
The principle is based on the multi-channel packaging tool in the previous article. We use apktool to decompress the APK file to be verified, read androidmanifest. XML, and output the package when we read the channel number line.
The source code is as follows:
Main. Java
Package COM. market5577.channelverifytool; public class main {public static void main (string [] ARGs) {system. out. println ("===========
reply to the confirmation of the deletion of the message secretly, each month to deduct the user 3 to 5 dollars of money to profit. Believe that more than 85% users will not find the issue of the charges, a few small amount of money is not so easy to detect, but in the long run, the loss is not to be belittled. NBSP;NBSP;NBSP;NBSP;NBSP;NBSP; How to help developers to Android app program encryption, effectively avoid the above hidden dangers?
declared in Apk.permissions Print the permissions from the APK.RESOURC ES print the Resource table from the Apk.configurations print the configurations in the Apk.xmltree print the compiled XML s in the given assets.xmlstrings Print the strings of the given compiled XML assets.
View basic Information
1
[Email protected]:~/lab$ aapt D badging yingyonghui.apk
View app Permissions
1
[Email protected]:~/lab$ aapt D permissions yingyong
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.