reverse engineering android application

12
Surve Gajanand Rao (Black ComputerGeek.i n Fb.com/gajasu rve

Upload: nu-the-open-security-community

Post on 16-Apr-2017

787 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Reverse Engineering Android Application

Surve Gajanand Rao (Blackc0d3r)

ComputerGeek.in Fb.com/gajasurve

Page 2: Reverse Engineering Android Application

Reverse Engineering Of Android Applications

Page 3: Reverse Engineering Android Application

A Quick Review

It is a open Source Software platform and operating system for mobile devices

Based On Linux Kernel

Allows Writing Managed code In Java.

Android Has It’s own Virtual Machine DVM ( Dalvik Virtual Machine ) Which Is used for executing android applications.

Framework Based On Linux 2.6 Kernel

Page 4: Reverse Engineering Android Application

What We Need?

JRE Installed.

Apktools

SignApk

Dex2jar

JD-GUI

Page 5: Reverse Engineering Android Application
Page 6: Reverse Engineering Android Application
Page 7: Reverse Engineering Android Application

The Two Approaches

DEX SMALI

DEX JAR JAVA

( Apktool )

( Dex2jar )

Page 8: Reverse Engineering Android Application
Page 9: Reverse Engineering Android Application

Dex2jar || JD-GUI

Page 10: Reverse Engineering Android Application

$ apktool b test –o test1.apk

I: Using Apktool 2.0.1 on test

I: Checking whether sources has changed...

I: Smaling smali folder into classes.dex...

I: Checking whether resources has changed...

I: Building resources...

I: Building apk file...

I: Copying unknown files/dir...

$

Binding The Apk

Page 11: Reverse Engineering Android Application

Live Demo’s !

Page 12: Reverse Engineering Android Application

Surve Gajanand Rao (Blackc0d3r)

ComputerGeek.in Fb.com/gajasurve