The crawler app reverses a certain sound %%% record

Organized in late October 2020, dedicated to you who are unwilling to be ordinary

For more enterprise-level crawler knowledge, please check: https://blog.csdn.net/weixin_45316122/article/details/109840745

 

 

01 Writing Android programs

 Download Android Studio program

Download link: http://www.android-studio.org/index.php/download/hisversion 

02 Crack the first Android program written

The tool called  Android killer   can decompile this apk into a smali file by pulling this .apk file into his software, and then change these smali files and repackage them into a new apk, and it will generate one and the original apk. The same new apk This new apk is the cracked apk 

Link: http://pan.baidu.com/s/1skClh3f  Password: 6u0q

03 Crack an Android game 

04 Debug smali code dynamically

Use AndroidStudio to dynamically debug smali Then before starting to dynamically debug smali, you must first decompile the apk to be debugged into a smali file and then import it into AndroidStudio, right?

So how do you decompile this apk into a smali file?

Pull the apk directly into the Androidkiller software and then AndroidKiller will automatically decompile the apk into a smali file 

The opening process needs to download the ideasmali plugin

Link: https://pan.baidu.com/s/1htl26qS  Password: 0pre

05 Insert Log in the smali code

06 Write the first so with AndroidStudio

The main line is: how to write a so with AndroidStudio and call the method in the so on the java layer?

Download the NDK introduction address https://www.jianshu.com/p/2eb3b2f754a2

NDK role

  • Get excellent performance from the device for computationally intensive applications, such as games or physics simulations.
  • Reuse your own or other developers' C or C++ libraries.
  • Port applications between platforms.

Embarrassing ndk exists in AndroidStudio

07 IDA cracked the first so

Use apktool to unpack

Use smali2java-directly convert smali into java ( https://blog.csdn.net/huangxiaoguo1/article/details/52635854/ )

The use of IDA as a reverse artifact ( https://www.cnblogs.com/aikongmeng/articles/10657479.html )

IDA installation address: http://www.xue51.com/soft/5499.html   Baidu cloud disk address https://pan.baidu.com/s/1j6eOuclIin06XqIScknhfA#list/path=%2Fsharelink4279067727-905229651157556%2F5499&parentPath=%2Fsharelink4279067727 -905229651157556

08 IDA blasting signature verification

Knowing through Baidu that an apk has only one signature and this signature must exist, otherwise your apk cannot be installed on the phone.

09 IDA dynamic crack login verification

JEB decompiled APK static analysis of Java code, refer to the link ( https://www.52pojie.cn/thread-742250-1-1.html )

10 Static analysis anti-debugging apk

Use tool, jeb ida,

What is anti-debugging?
Answer: Anti-debugging technology is to protect the code of your own program from being reversed. Increase the difficulty of reverse analysis to prevent the program from being cracked, aiming at dynamic analysis.

After consulting a lot of information, there are probably three methods:
1. Modify the source code, recompile the kernel (ref 2)
2.
Reversely modify the kernel file, patch binary file 3. Hook fopen function, check the /proc/pid/status call (ref 3 )

11 Dynamic debugging init_array

Breakpoint principle? What is the role of dynamic debugging?

12 write xposed module

 

7.15 records

Introduction to arm64-v8a, armeabi-v7a, armeabi, x86 in Android~

https://blog.csdn.net/fengyeNom1/article/details/80759281

andserver  https://yanzhenjie.com/AndServer/

7.16 records

Usage of AndServer to build service https://blog.csdn.net/tangsilian/article/details/100118692

 

 

 

 

 

 

 

 

Guess you like

Origin blog.csdn.net/weixin_45316122/article/details/107319015