Stu w02b Beginners Guide To Reverse Engineering Android Apps PDF
Stu w02b Beginners Guide To Reverse Engineering Android Apps PDF
Android Apps
SESSION ID: STU-W02B
Agenda
#RSAC
Anatomy of an
Android app
App resources
Signature
#RSAC
Backup to SD Card:
APKOptic
etc
#RSAC
#RSAC
https://github.com/egirault/googleplay-api
http://apps.evozi.com/apk-downloader/
http://apify.ifc0nfig.com/static/clients/apk-downloader/
#RSAC
https://github.com/egirault/googleplay-api
http://apps.evozi.com/apk-downloader/
http://apify.ifc0nfig.com/static/clients/apk-downloader/
#RSAC
Disassembling
DEX
Smali
#RSAC
11
Apktool
apktool https://code.google.com/p/android
-apktool/
#RSAC
12
Smali
#RSAC
13
DEX
JAR
JAVA
#RSAC
14
Dex2Jar
dex2jar - https://code.google.com/p/dex2jar/
Allows to use any existing Java decompiler with the resulting JAR file
#RSAC
15
Java Decompilers
Jd-gui - http://jd.benow.ca/
Multi platform
closed source
JAD - http://varaneckas.com/jad/
Multi platform
closed source
Command line
16
DEX
JAVA
#RSAC
17
Dalvik Decompilers
Pure Dalvik decompilers skip this step, so they produce better output
Others?
#RSAC
18
Demo Santoku
Mobile Forensics
Mobile application
assessment
#RSAC
20
Summary
APK files are ZIP files, can be extracted with any unzip utility
Santoku Linux has all the tools you need to reverse engineering
mobile apps
#RSAC
21
@pof
github.com/poliva
#RSAC
22