Lect_5 - Deekshith19/Android_Security GitHub Wiki

Reverse Engineering of Android App

  1. APK Tool

image

Decomiplation: Trying to reach to Source Code From Executable File. Here .dex means Dalvik Executable Code Format

apktool d .\app-debug.apk -o test

image

We observe that the testsample directory does not contain the classes.dex and resources.arsc files previously present in the ZIP file. We observe that there is a apktool.yml file created in the directory. We also observe that there is another AndroidManifest.xml in a new directory called original. We also observe that there is a new directory called smali which was decompiled from the classes.dex file present in the original APK ZIP archive.

image

image

image

Now Jadx Tool

jadx is a Dex to Java decompiler. It is a command line and GUI tools for producing Java source code from Android Dex and Apk files

image

The decompiled JAVA source code is seen in the JADX window.

image

We can save the decompiled JAVA source code as a Gradle project.