In addition to Weibo, there is also WeChat
Please pay attention

WeChat public account
Shulou
2025-10-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
[toc]
# preface to 0x00
# # for some unknown reason, please see
Android reverse-Android basic reverse (1)
Android reverse-Android basic reverse (2)
# # and java series:
Android inverse-java Code Base (1)
Android reverse-java Code Base (2)
Android reverse-java Code Base (3)
Android reverse-java Code Base (4)
Android reverse-java Code Base (5)
Android reverse-java Code Base (6)
Android reverse-java Code Base (7)
Android inverse-java Code Base (8)
Because the pseudo-encryption part of the previous Android reverse-Android basic reverse (2) is too long, so the other content is not completed, so there is the Android reverse-Android basic reverse (2-2). Hope to be able to complete the contents of the plan.
# # Learning content
(1) pseudo-encrypt √ for APK files
(2) Anti-decompilation of resource files
(3) apk packaging process
(4) apk decompilation process
(5) apk recompilation process,
# Anti-decompilation of 0x01 resource files
As mentioned earlier, you can prevent a certain degree of decompilation by changing the fourth field. So in addition to this pseudo-encryption, is there any other way to prevent the emergence of this kind of pseudo-encryption?
Take a look at how resource files prevent decompilation.
Naturally, we need to study the format of the xml file. The fourth brother has already analyzed it in 2016, but it is analyzed by others, and only looking at the analysis of others can not carry out more in-depth study. Paper will sleep shallow, never know the matter want to practice. So, there is this article.
# # 1. The first module
Here we use an example analysis, which uses the simple apk in Android inverse-Android Foundation inverse (1) to analyze.
# 1.1 Magic Number
The number of demons here is 00 08 00 03, which is a fixed value.
# 1.2File Size
This is used to confirm the file size.
This is 00 00 07 90, or 1970 bytes.
# 1.3 Analysis with python
The fourth brother wrote it in java, so I made a fool of myself to write a python. In the process of learning python, please forgive me for any mistakes or bad things I did.
This is the code that implements this module. But I feel that my writing is so tedious. I'll revise it later.
At 11:57:35 on January 27th, 2018, I was busy with something else.
Def fenxi (filename): try: f=open (filename 'rb') print' start-' iTunes 0 p1 = "" p2 = "" p3 = "" p4 = "" p = "while True: t=f.read (1) t1=t.encode ('hex') if iTunes 0: p1=t1 if iTunes 1: P2=t1 if iTunes 2: p3=t1 if iTunes 3: p4=t1 i=i+1 if I
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

The market share of Chrome browser on the desktop has exceeded 70%, and users are complaining about
The world's first 2nm mobile chip: Samsung Exynos 2600 is ready for mass production.According to a r
A US federal judge has ruled that Google can keep its Chrome browser, but it will be prohibited from
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope





About us Contact us Product review car news thenatureplanet
More Form oMedia: AutoTimes. Bestcoffee. SL News. Jarebook. Coffee Hunters. Sundaily. Modezone. NNB. Coffee. Game News. FrontStreet. GGAMEN
© 2024 shulou.com SLNews company. All rights reserved.