Android-apk bypasses the signature

Android-APK reverse and bypass signature

Android-APK reverse and bypass Bypassing the signature
? 1. Android Killer connects to the night god emulator
? 2. Simple APK reverse engineering
? 3. Compilation failed, unable to sign

TOC

? 1.Android Killer connects to the night god simulator

1. Environment setup

  • 1. Copy the files in the AndroidKiller path D:\Android\AndroidKiller\bin\adb to the location where the night god is located
    share picture
  • 2 .Use cmd to go to the D:\Android\AndroidKiller\bin\adb directory and execute the command: adb.exe connect 127.0.0.1:62001 ;62001 is the default port number of the Yeshen simulator; adb devices to view the connected simulator; refresh to find the device in Killer
    share picture

? 2. Reverse of simple APK

1. According to the prompt of APK running, you can directly perform string search
share picture

2. The steps are shown in the figure:
share picture

3. After analysis, find the successful judgment The key code can be commented out directly; remember to save and compile again
share picture

? 3. Compilation fails and cannot be signed

1. When using Killer to install APK, Need to compile
share picture

  • Compiled effect:
    Share a picture

2. Find the key code through analysis, modify or in-depth analysis, and then repackage
share picture

  • 1. Copy the smali folder Go to the tool folder
    share picture
  • 2.smali.jar (assembly tool, assemble smali code into dex file)
    share picture
  • 3. Unzip the APK, before replacing it Modified dex file
    share picture
  • 4. Compress the decompressed file again and modify the suffix .apk, run sign.bat to sign
    Share a picture

< p>3. Install and run normally
Share pictures

Leave a Comment

Your email address will not be published.