Postingan

Menampilkan postingan dengan label Android penetration testing

Reverse Engineering an Android application

Gambar
Introduction: The Android compiler suite compiles the developer's Java files into class files, and then the class files are converted into dex files. Dex files are bytecode for the DalvikVM which is a non-standard JVM that runs on Android applications. The XML files are converted into a binary format that is optimized to create small files. The dex files, binary XML files, and other resources, which are required to run an application, are packaged into an Android package file. These files have the .apk extension, but they are just ZIP files. Once the APK package is generated, it is signed with a developer's key and uploaded onto the  Androidmarket via Google's website from where the user can download these APK files and install them on the Android device. Requirements: Tool to unpack the .apk file : 7zip Tool to convert the .dex to a .jar file : dex2jar GUI tool for Java decompilation : JD-GUI The android apk file. Detailed Steps: Step 1: You can get the apk file matc...