source: cyberguerre.blogspot.com |
Tools Required
- Dex2jar : It is a tool which is used when working with android .dex and java .jar files.
- Jd-gui : This tool opens up the entire coding of .apk file.
In this article I will be taking example of faceniff.apk as the app to see source code of, but you can take any app of your choice.
Steps involved in reverse engineering android app :
- Change the extension of android app to "faceniff.apk.zip".
3. Now open the command prompt and type "cd \".
4. Then type "cd c:\android\dex2jar-0.0.9.7".( here "C:\android\dex2jar-0.0.9.7" is the path of dex2jar tool in my drive, this may be different for you). Press enter.
5. Now type "dex2jar c:\android\Faceniff\classes.dex". Here "c:\android\Faceniff\classes.dex" is the path of the classes.dex file which your will surely be in the the extracted folder of the android app.
6. You will notice a new executable jar file in the unzipped folder of app. Now open that app with "jd.gui" and you will be able to see the source code of android app.
No comments:
Post a Comment