Android reverse 9. SOA library with IDA attached debug APK

1. Execute [adb devices] in the CMD window to check whether the emulator is properly connected

 

2. Send the android_server under the dbgsrv folder in the IDA installation directory to the Android emulator. Note that the path where the android_server file is located must not have Chinese characters and spaces, otherwise the adb push command will be wrong. , Use the following command to send android_server to the emulator. 
[Adb push C: \ android_server / data / local / tmp]

 

3. Execute [adb shell] command

 

4. Execute [su] to gain root authority

 

5. Execute [cd / data / local / tmp] to switch the path to / data / local / tmp

 

6. Execute [ls -l] to query all files in the directory and read and write permissions

 

7. Execute [chmod 777 android_server] to modify android_server file permissions to 777 permissions

 

8. Execute [ls -l] again to see if the file permissions have been modified successfully

 

9. Execute [./android_server] to start android_server

 

10. Don't close the original window, reopen a new CMD window, execute [adb forward tcp: 23946 tcp: 23946 ] for port forwarding

 

11. Open the APK to be debugged on the simulator

 

12. Open IDA and select Debugger-> Attach-> Remote ARM Linux / Android debugger

 

13. Enter 127. 0.0 . 1

 

14. Select the process to be debugged and click OK. If you don't see the process name in this step, it proves that you don't have root permission. You need to check whether the installed system image has been rooted, and whether the su command is correctly executed in the abd shell!

 

15. At this point IDA has been attached to the process and successfully disconnected. Press the shortcut key F9 to make the program run.

Guess you like

Origin www.cnblogs.com/fuhua/p/12738778.html