Skip to main content

All Questions

Tagged with
0 votes
0 answers
19 views

JSON mapping with obfuscated property names

I'm building a replacement server for the 2013 Android-based PlayJam GameStick micro console and implemented the server-side leaderboard APIs. One game crashes when retrieving the leaderboard data, ...
cweiske's user avatar
  • 125
1 vote
0 answers
348 views

deobfuscate Dexgaurd obfuscated code

I was reversing an apk. the code detects whether the apk is running on a rooted device or not. if it is rooted or an emulator it will stop and close out. so this is the snippet code which I think it ...
hanan's user avatar
  • 309
2 votes
0 answers
101 views

Trying to replicate encryption of an android app

I was trying to replicate/copy the encryption of an android app which uses CryptoJS with sha256 encryption as having seen in the source code of the android app. fingerprinting the app, it was built ...
hanan's user avatar
  • 309
1 vote
1 answer
3k views

How to deobfuscate native Android library obfuscated with OLLVM?

When I load the binay in IDA, all I can see are loads of .datadiv_decodeXXX... functions and this is because of OLLVM. I know it is possible as a Chinese article I found said they were able to ...
Charlie Niekirk's user avatar
1 vote
0 answers
130 views

Missing Map from Java Native Method to C Code

When writing a C implementation for a native Java method in Android, the rule is to name the C function according to the convention "Java_com_...". But I encountered an APK in which there are no such ...
Zirui Wang's user avatar
0 votes
2 answers
2k views

verifyError in youtube android app modification

I try to decompile youtube android application and modify it but when I build the application and install on a virtual device faced with below error: E/AndroidRuntime(1782): java.lang.VerifyError: ...
hossein abdi's user avatar
9 votes
3 answers
1k views

Is there a name for this kind of "obfuscation" for the machine code from C++?

I was trying to reverse engineer an android ndk (arm) using ida pro on a static analysis. However, it appears there are a lot of useless jumps to the same place and with random values set to R1 to ...
Y M's user avatar
  • 118
0 votes
2 answers
2k views

Android App's hardcoded local keystore password r3versing

Novice Android security researcher here. Recently I was tasked with the task/challenge of exposing a certain app's hardcoded local keystore password. I've decompiled it with JEB2 and obviously within ...
martin_s's user avatar
0 votes
1 answer
149 views

What do the unusually named packages and files usually mean?

When decompiling an apk with apktool, the classes.dex file is decompiled into folders smali_classes#, and sorted their respective packages. I recognize some of the files, as they are mentioned in ...
John K's user avatar
  • 153
1 vote
1 answer
851 views

I'm decompiling an apk file to learn how the creator designed the UI for their app. Are these layout files obfuscated?

I'm new to decompiling apps. Most of the apps I decompile aren't very popular, so obfuscation hasn't been a problem yet. I'm not entirely sure what obfuscation looks like. The current app I'm looking ...
God Usopp's user avatar
  • 111
95 votes
9 answers
322k views

How do I reverse-engineer .so files found in Android APKs?

I know how to reverse-engineer normal Android APKs using tools like apktool and dex2jar, but I don't know how to work with obfuscation. When I extract everything from APK, I get some Smali files (I ...
Pervy Sage's user avatar
  • 1,225