Android-APK reverse and bypass signature
? 1. Android Killer connects to the night god emulator
? 2. Simple APK reverse engineering
? 3. Compilation failed, unable to sign
TOC
? 1.Android Killer connects to the night god simulator
1. Environment setup
- 1. Copy the files in the AndroidKiller path
D:\Android\AndroidKiller\bin\adb
to the location where the night god is located
- 2 .Use
cmd
to go to theD:\Android\AndroidKiller\bin\adb
directory and execute the command:adb.exe connect 127.0.0.1:62001
;62001 is the default port number of the Yeshen simulator;adb devices
to view the connected simulator; refresh to find the device in Killer
? 2. Reverse of simple APK
1. According to the prompt of APK running, you can directly perform string search
2. The steps are shown in the figure:
3. After analysis, find the successful judgment The key code can be commented out directly; remember to save and compile again
? 3. Compilation fails and cannot be signed
1. When using Killer to install APK, Need to compile
p>
- Compiled effect:
2. Find the key code through analysis, modify or in-depth analysis, and then repackage
- 1. Copy the smali folder Go to the tool folder
- 2.smali.jar (assembly tool, assemble smali code into dex file)
- 3. Unzip the APK, before replacing it Modified dex file
- 4. Compress the decompressed file again and modify the suffix
.apk
, runsign.bat
to sign
< p>3. Install and run normally
WordPress database error: [Table 'yf99682.wp_s6mz6tyggq_comments' doesn't exist]SELECT SQL_CALC_FOUND_ROWS wp_s6mz6tyggq_comments.comment_ID FROM wp_s6mz6tyggq_comments WHERE ( comment_approved = '1' ) AND comment_post_ID = 3571 ORDER BY wp_s6mz6tyggq_comments.comment_date_gmt ASC, wp_s6mz6tyggq_comments.comment_ID ASC