Android-APK reverse and bypass signature
? 1. Android Killer connects to the night god emulator
? 2. Simple APK reverse engineering
? 3. Compilation failed, unable to sign
TOC
? 1.Android Killer connects to the night god simulator
1. Environment setup
- 1. Copy the files in the AndroidKiller path
D:\Android\AndroidKiller\bin\adbto the location where the night god is located

- 2 .Use
cmdto go to theD:\Android\AndroidKiller\bin\adbdirectory and execute the command:adb.exe connect 127.0.0.1:62001;62001 is the default port number of the Yeshen simulator;adb devicesto view the connected simulator; refresh to find the device in Killer

? 2. Reverse of simple APK
1. According to the prompt of APK running, you can directly perform string search

2. The steps are shown in the figure:

3. After analysis, find the successful judgment The key code can be commented out directly; remember to save and compile again

? 3. Compilation fails and cannot be signed
1. When using Killer to install APK, Need to compile
p>
- Compiled effect:

2. Find the key code through analysis, modify or in-depth analysis, and then repackage

- 1. Copy the smali folder Go to the tool folder

- 2.smali.jar (assembly tool, assemble smali code into dex file)

- 3. Unzip the APK, before replacing it Modified dex file

- 4. Compress the decompressed file again and modify the suffix
.apk, runsign.batto sign

< p>3. Install and run normally

WordPress database error: [Table 'yf99682.wp_s6mz6tyggq_comments' doesn't exist]SELECT SQL_CALC_FOUND_ROWS wp_s6mz6tyggq_comments.comment_ID FROM wp_s6mz6tyggq_comments WHERE ( comment_approved = '1' ) AND comment_post_ID = 3571 ORDER BY wp_s6mz6tyggq_comments.comment_date_gmt ASC, wp_s6mz6tyggq_comments.comment_ID ASC
