查看原文
其他

Android逆向分析常用方法

gyp880115 哆啦安全 2022-05-24

一、Android的反混淆工具2

二、一键反编译apk/aar/dex/jar3

  (1)、Windows环境配置使用TTDeDroid3

  (2)、Ubuntu环境配置使用TTDeDroid4

三、Apk脱壳后合并多个dex并使用jadx/JEB/JEB3分析合并后的Apk4

四、常用的Android逆向分析工具


一、Android的反混淆工具

git clone --recursive https://github.com/CalebFenton/simplify.git


git submodule update --init --recursive


./gradlew fatjar



 

gradlew.bat fatjar

 

java -jar simplify/build/libs/simplify-1.2.1.jar -h

 

java -jar simplify/build/libs/simplify.jar -it 'org/cf/obfuscated' -et 'MainActivity' simplify/obfuscated-app.apk

 

java -jar simplify/build/libs/simplify-1.2.1.jar -it 'org/cf' G:\workspace\simplify\simplify\src\test\resources\obfuscated-example -o g:\example.dex


二、一键反编译 apk/aar/dex/jar

git clone https://github.com/tp7309/TTDeDroid.git

 

(1)、Windows环境配置使用TTDeDroid

把H:\SecurityAnalysis\TTDeDroid\bin添加到环境变量,如图所示:





(2)、Ubuntu环境配置使用TTDeDroid

把export PATH=$PATH:/home/gyp/gyp/SecurityAnalysis/TTDeDroid/bin添加到~/.bashrc中,如图所示:



vim ~/.bashrc

 

source ~/.bashrc

 

chmod a+x /home/gyp/gyp/SecurityAnalysis/TTDeDroid/bin/showjar

 

showjar test.apk

 

三、Apk脱壳后合并多个dex并使用jadx/JEB/JEB3分析合并后的Apk

https://github.com/Simp1er/AndroidSec.git


python3 dex2apk.py -a ****.apk -i dex_unpack/ -o ****-output.apk




四、常用的Android逆向分析工具

  apktool

       https://bitbucket.org/iBotPeaches/apktool/downloads/


       XJad

       https://www.lanzous.com/i2vvdvi


       Smali2JavaUI

       https://forum.xda-developers.com/showthread.php?t=2430413


       jadx

       https://github.com/skylot/jadx/releases


       JEB

       https://www.pnfsoftware.com/


      JEB3

      https://www.pnfsoftware.com/blog/jeb3-alpha-is-available/

      https://www.pnfsoftware.com/blog/category/jeb3/


      GDA

      http://www.gda.wiki:9090/


      IDA

      https://www.hex-rays.com/products/ida/news/

      https://www.hex-rays.com/products/ida/

      https://ida2020.org/


欢迎各位关注公众号

您可能也对以下帖子感兴趣

文章有问题?点此查看未经处理的缓存