Organized in late October 2020, dedicated to you who are unwilling to be ordinary
For more enterprise-level crawler knowledge, please check: https://blog.csdn.net/weixin_45316122/article/details/109840745
01 Writing Android programs
Download Android Studio program
Download link: http://www.android-studio.org/index.php/download/hisversion
02 Crack the first Android program written
The tool called Android killer can decompile this apk into a smali file by pulling this .apk file into his software, and then change these smali files and repackage them into a new apk, and it will generate one and the original apk. The same new apk This new apk is the cracked apk
Link: http://pan.baidu.com/s/1skClh3f Password: 6u0q
03 Crack an Android game
04 Debug smali code dynamically
Use AndroidStudio to dynamically debug smali Then before starting to dynamically debug smali, you must first decompile the apk to be debugged into a smali file and then import it into AndroidStudio, right?
So how do you decompile this apk into a smali file?
Pull the apk directly into the Androidkiller software and then AndroidKiller will automatically decompile the apk into a smali file
The opening process needs to download the ideasmali plugin
Link: https://pan.baidu.com/s/1htl26qS Password: 0pre
05 Insert Log in the smali code
06 Write the first so with AndroidStudio
The main line is: how to write a so with AndroidStudio and call the method in the so on the java layer?
Download the NDK introduction address https://www.jianshu.com/p/2eb3b2f754a2
NDK role
- Get excellent performance from the device for computationally intensive applications, such as games or physics simulations.
- Reuse your own or other developers' C or C++ libraries.
- Port applications between platforms.
Embarrassing ndk exists in AndroidStudio
07 IDA cracked the first so
Use apktool to unpack
Use smali2java-directly convert smali into java ( https://blog.csdn.net/huangxiaoguo1/article/details/52635854/ )
The use of IDA as a reverse artifact ( https://www.cnblogs.com/aikongmeng/articles/10657479.html )
IDA installation address: http://www.xue51.com/soft/5499.html Baidu cloud disk address https://pan.baidu.com/s/1j6eOuclIin06XqIScknhfA#list/path=%2Fsharelink4279067727-905229651157556%2F5499&parentPath=%2Fsharelink4279067727 -905229651157556
08 IDA blasting signature verification
Knowing through Baidu that an apk has only one signature and this signature must exist, otherwise your apk cannot be installed on the phone.
09 IDA dynamic crack login verification
JEB decompiled APK static analysis of Java code, refer to the link ( https://www.52pojie.cn/thread-742250-1-1.html )
10 Static analysis anti-debugging apk
Use tool, jeb ida,
What is anti-debugging?
Answer: Anti-debugging technology is to protect the code of your own program from being reversed. Increase the difficulty of reverse analysis to prevent the program from being cracked, aiming at dynamic analysis.
After consulting a lot of information, there are probably three methods:
1. Modify the source code, recompile the kernel (ref 2)
2.
Reversely modify the kernel file, patch binary file 3. Hook fopen function, check the /proc/pid/status call (ref 3 )
11 Dynamic debugging init_array
Breakpoint principle? What is the role of dynamic debugging?
12 write xposed module
7.15 records
Introduction to arm64-v8a, armeabi-v7a, armeabi, x86 in Android~
https://blog.csdn.net/fengyeNom1/article/details/80759281
andserver https://yanzhenjie.com/AndServer/
7.16 records
Usage of AndServer to build service https://blog.csdn.net/tangsilian/article/details/100118692