Android Reverse Engineering
Static Reversing - JADX
- Use jadx GUI - installable in Kali with
apt install jadx
, pass it the apk file
- Check out the AndroidManifest.xml to see two things:
- What permission the app requests
- Entry points to the application (android:enabled=”true” or android:exported=”true”), browse to the
android.name
in the code
- This will lead to the starting code, can double click functions within this starting code to see where they are/what they do
Dynamic Reversing - ADB/Burpsuite
Frida
- Process injection
- Can hook functions and change return values to bypass anti-emulators and such