How to reverse engineer an android app?

Asked

Viewed 12,581 times

8

As from an android app in the extension . apk, get the classes, layouts, libraries etc, ie, perform reverse engineering?

Note: I used 7-zip as Bacco advised and resulted in the following file folder:

imagem

Classes appear in this extension . Dex and Resources in the extension . arsc, as I think they are protected, such as having access to the classes and Resources of this application?

  • You can start by opening . apk with unzip, 7-Zip or similar tools.

  • @Bacco posted the image of the files generated by 7-zip.. but it is still protected the classes and Resources..

1 answer

14


Got some tools for that:

  • The 7-Zip can be used to unzip the .apk;

  • To leave converts files .dex in archives .jar;

    d2j-dex2jar.sh -f -o saida.jar entrada.apk  (linux)
    d2j-dex2jar.bat -f -o saida.jar entrada.apk (windows)
    
  • To Jd-Gui is used to view the contents of jar.

jd-gui

  • you know the reason some package containing classes does not open behind Jd-Gui.

Browser other questions tagged

You are not signed in. Login or sign up in order to post.