reverse engineering android application
TRANSCRIPT
![Page 1: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/1.jpg)
Surve Gajanand Rao (Blackc0d3r)
ComputerGeek.in Fb.com/gajasurve
![Page 2: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/2.jpg)
Reverse Engineering Of Android Applications
![Page 3: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/3.jpg)
A Quick Review
It is a open Source Software platform and operating system for mobile devices
Based On Linux Kernel
Allows Writing Managed code In Java.
Android Has It’s own Virtual Machine DVM ( Dalvik Virtual Machine ) Which Is used for executing android applications.
Framework Based On Linux 2.6 Kernel
![Page 4: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/4.jpg)
What We Need?
JRE Installed.
Apktools
SignApk
Dex2jar
JD-GUI
![Page 5: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/5.jpg)
![Page 6: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/6.jpg)
![Page 7: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/7.jpg)
The Two Approaches
DEX SMALI
DEX JAR JAVA
( Apktool )
( Dex2jar )
![Page 8: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/8.jpg)
![Page 9: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/9.jpg)
Dex2jar || JD-GUI
![Page 10: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/10.jpg)
$ apktool b test –o test1.apk
I: Using Apktool 2.0.1 on test
I: Checking whether sources has changed...
I: Smaling smali folder into classes.dex...
I: Checking whether resources has changed...
I: Building resources...
I: Building apk file...
I: Copying unknown files/dir...
$
Binding The Apk
![Page 11: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/11.jpg)
Live Demo’s !
![Page 12: Reverse Engineering Android Application](https://reader035.vdocuments.site/reader035/viewer/2022082202/5871997a1a28ab044e8b5615/html5/thumbnails/12.jpg)
Surve Gajanand Rao (Blackc0d3r)
ComputerGeek.in Fb.com/gajasurve