Kai xin Bao app's token algorithm to crack - Reverse articles (b)

Kai xin Bao app's token algorithm to crack - Ethereal Analysis Section (a) the article has been packet capture analysis of the app, it will now continue to reverse.
For an app, we want to reverse app, what you need to know it?

  • Reverse tool
  • Java-based, even the c and assembly base
  • Type of reinforcement tools and shelling
  • Android Development Foundation
  • Andrews cognitive system
  • Awareness of xposed
  • smali basis

These are necessary to understand even the master, reptiles reverse the road farther and farther.
Now the question, what kind of app which app is it? ?
How to view the app if reinforcement (shell) it?
We must rely on easy to develop this app to test (with simultaneous shelling function)


You can see that the app is 360 reinforcement, we direct shelling, shelling and then export the data to a computer sharing, export data to dex.


dex What is it?
This article can find out On Android Dex file
writing this article is not related basis. Readers also need their own learning.
We now have Android apk of dex, now we need to reverse the dex.
Here the recommended tools gda (Chinese people to write their own), jeb (powerful, need to pay), jadx (reverse a more conducive to reading code), if it comes to ndk, we also need to ida, tools specific usage here not explained in detail. The use jadx reverse dex file, and then save into Java source code analysis, Java source code analysis, as used herein idea (Java Development Tools).
In use jadx decompile dex time, memory usage is relatively large, please pay attention to the size of memory.


After saving the map into Java source code, using the idea to open, and then continue to analyze token, next to continue.
Welcome attention to white micro-channel public number [white] technology community, learn together with the exchange

Guess you like

Origin www.cnblogs.com/xbjss/p/11415184.html