Jump to content
ZeroCold

Android reverse engineering - view source code of any android app

Recommended Posts

Posted

Tools Required:

  • Dex2jar : It is a tool which is used when working with android .dex and java .jar files.
  • Jd-gui : This tool opens up the entire coding of .apk file.

You can Download both these tools from here.

In this article I will be taking example of faceniff.apk, but you can take any app of your choice.

Steps involved in reverse engineering android app:

Change the extension of android app to “faceniff.apk.zip“.

Capture.png

Unzip the file using any unzipping software.

Now open the command prompt and type “cd “.

Then type “cd c:androiddex2jar-0.0.9.7?. (Here “C:androiddex2jar-0.0.9.7” is the path of dex2jar tool in my drive, this may be different for you). Press enter.

Capture1.png

Now type “dex2jar c:androidFaceniffclasses.dex“. Here “c:androidFaceniffclasses.dex” is the path of the classes.dex file which your will surely be in the extracted folder of the android app.

2.png

You will notice a new executable jar file in the unzipped folder of app. Now open that app with “jd.gui” and you will be able to see the source code of android app.

Capture3.png

Credite: Shikil Sharma

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...