Reverse Engineering Android APK


Vicious… yes!

Problem:

You’ve downloaded an APK somewhere and you want to extract images, xml and source. For simplicity we work with appname.apk

Resources:

  1. http://code.google.com/p/android-apktool/
  2. http://code.google.com/p/dex2jar/
  3. http://java.decompiler.free.fr/?q=jdgui


Extract images and xml:

  1. Launch from command line apktool passing appname.apk as first argument, then
  2. appname folder will be created and there you can find xml files and images.

Extract sources:

  1. Rename appname.apk in appname.zip, open it with your favorite archive manager, and extract the classes.dex file.
  2. In order to avoid path problem, I advice you  to copy the classes.dex file in dex2jar-* folder.
  3. Depending your operating system, launch from command line related dex2jar script passing classes.dex as first argument.
  4. Then, you’ll find the executable jar file classes_dex2jar.jar in the same directory.
  5. Open it with jd-gui and good luck!

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s