jeudi 26 mars 2015

Android APK Reverse Engineering

Hello.

Im trying to modify an Android APK to jump a key file verification.

I want to do that in order to learn smali and Baksmali and to improve protection of future Apps or APK files.



What i done so far:

1-Decompile APK to smali files

2-Look in to AndroidManifest.xml to locate Activity:

<activity android:name=".ReparadorReceiver" android:screenOrientation="portrait" />

<activity android:name=".ShutdownReceiver" android:screenOrientation="portrait" />

<activity android:name=".AcercaDe" android:screenOrientation="portrait" />

So the main activity is AcercaDe.

3- On AcercaDe.smali there is a call to a funtion with return boolean value:

invoke-virtual {v2, v3}, Landroid/os/Bundle;->containsKey(Ljava/lang/String;)Z

I try to change conditional if-eqz or if-nez but i cant figure out how to skip or jump this check.

I will attach the APK file just in case anyone want to try it.

http://ift.tt/1NdbiZu



Any help or ligth will be apreciate.





via Welcome to gsm-tips http://ift.tt/1Izk7ds

Aucun commentaire:

Enregistrer un commentaire