Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Reverse Engineering Android Application

1,167 views

Published on

Reverse Engineering Android Application

Published in: Technology
  • Be the first to comment

Reverse Engineering Android Application

  1. 1. Surve Gajanand Rao (Blackc0d3r) ComputerGeek.in Fb.com/gajasurve
  2. 2. Reverse Engineering Of Android Applications
  3. 3. A Quick Review  It is a open Source Software platform and operating system for mobile devices  Based On Linux Kernel  Allows Writing Managed code In Java.  Android Has It’s own Virtual Machine DVM ( Dalvik Virtual Machine ) Which Is used for executing android applications.  Framework Based On Linux 2.6 Kernel
  4. 4. What We Need?  JRE Installed.  Apktools  SignApk  Dex2jar  JD-GUI
  5. 5. The Two Approaches DEX  SMALI DEX  JAR  JAVA ( Apktool ) ( Dex2jar )
  6. 6. Dex2jar || JD-GUI
  7. 7. $ apktool b test –o test1.apk I: Using Apktool 2.0.1 on test I: Checking whether sources has changed... I: Smaling smali folder into classes.dex... I: Checking whether resources has changed... I: Building resources... I: Building apk file... I: Copying unknown files/dir... $ Binding The Apk
  8. 8. Live Demo’s !
  9. 9. Surve Gajanand Rao (Blackc0d3r) ComputerGeek.in Fb.com/gajasurve

×