Android逆向分析之dex2jar异常处理

分析一个APK,发现APK反编译正常,能得到所有smali代码和xml文件,

接着使用dex2jar想把dex转抱成jar包,使逆向分析看起来更加方便,但是却出现了如下异常:

<span style="color:#ff0000;">com.googlecode.dex2jar.DexException: while accept method:[La/a/a;.bc()Ljava/lang/String;]</span>
	at com.googlecode.dex2jar.reader.DexFileReader.acceptMethod(DexFileReader.java:694)
	at com.googlecode.dex2jar.reader.DexFileReader.acceptClass(DexFileReader.java:441)
	at com.googlecode.dex2jar.reader.DexFileReader.accept(DexFileReader.java:323)
	at com.googlecode.dex2jar.v3.Dex2jar.doTranslate(Dex2jar.java:85)
	at com.googlecode.dex2jar.v3.Dex2jar.to(Dex2jar.java:261)
	at com.googlecode.dex2jar.v3.Dex2jar.to(Dex2jar.java:252)
	at com.googlecode.dex2jar.v3.Main.doData(Main.java:43)
	at com.googlecode.dex2jar.v3.Main.doData(Main.java:35)
	at com.googlecode.dex2jar.v3.Main.doFile(Main.java:63)
	at com.googlecode.dex2jar.v3.Main.main(Main.java:86)
Caused by: com.googlecode.dex2jar.DexException: while accept code in method:[La/a/a;.bc()Ljava/lang/String;]
	at com.googlecode.dex2jar.reader.DexFileReader.acceptMethod(DexFileReader.java:684)
	... 9 more
Caused by: java.lang.IllegalArgumentException: Id out of bound
	at com.googlecode.dex2jar.reader.DexFileReader.getType(DexFileReader.java:556)
	at com.googlecode.dex2jar.reader.DexOpcodeAdapter.x2c(DexOpcodeAdapter.java:356)
	at com.googlecode.dex2jar.reader.DexCodeReader.acceptInsn(DexCodeReader.java:656)
	at com.googlecode.dex2jar.reader.DexCodeReader.accept(DexCodeReader.java:337)
	at com.googlecode.dex2jar.reader.DexFileReader.acceptMethod(DexFileReader.java:682)
	... 9 more
看起来都是google.code.dex2jar工具代码异常,但是我们仔细看第一行提示信息:

# virtual methods
.method public bc()Ljava/lang/String;
    .locals 6

    .prologue
    .line 5
   #unknown opcode: 0xff
    nop

    :cond_0
    if-le v1, v4, :cond_0

    .line 6
    .local v2, "cca":Ljava/lang/String;
...

发现 第一行:

 #unknown opcode: 0xff
哦,看来就是看雪上那个保护APK的方法, http://bbs.pediy.com/showthread.php?t=177114

插入了相应的无效代码,导致了dex2jar工具解析出错了,

1.接下来我把这句直接删除,

2.再把smali回编译成dex

3.再用dex2jar工具重新尝试,果然这下出来了正常的jar包,用jd-gui或者luten可以正常查看java代码了,

逆向分析有了更加直接的参考代码。大家如果遇到此类解析出错了,不防尝试此方法。


原帖地址:http://blog.csdn.net/zhuobattle/article/details/38982891



注:1.利用不同的工具,最好是命令行,获取报错信息;
        2.查看报错信息一定要抓包关键的类和信息,一般在第一行显现..


猜你喜欢

转载自blog.csdn.net/zihao2012/article/details/44342427