reverse engineering
Something great is coming 😉 @reverseengineer101
If you are asking about this
This is a solution for the owasp challenge UnCrackable-Level2
In this tutorial you will learn how to analyze full the app and understand its behavior, to bypass root detection by Frida and manually by patching the app, find the activation code which will be in the native code and this will open your eyes on how the integration between java codes and native codes is also what is JNI at the and finally how to patch disassembly by radare2 to bypass the checks of the secret code and more !
I know that there are a lot of people solved that change but I worked on it in a different way with various methods to solve problems
This is a solution for the owasp challenge UnCrackable-Level2
In this tutorial you will learn how to analyze full the app and understand its behavior, to bypass root detection by Frida and manually by patching the app, find the activation code which will be in the native code and this will open your eyes on how the integration between java codes and native codes is also what is JNI at the and finally how to patch disassembly by radare2 to bypass the checks of the secret code and more !
I know that there are a lot of people solved that change but I worked on it in a different way with various methods to solve problems
👍6❤5👏1
Tools you should know :
1 - radare2 :
> official website :
https://rada.re/n/
> github :
https://github.com/radareorg
2 - Ghidra :
> official website :
https://ghidra-sre.org/
> github :
https://github.com/NationalSecurityAgency/ghidra
3 - IDA Free / IDA Pro (Hex-Rays) :
https://hex-rays.com
4 - Cutter :
> official website :
https://cutter.re/
> github :
https://github.com/rizinorg/cutter
5 - iaito :
> official website :
https://rada.re/n/iaito.html
> github :
https://github.com/radareorg/iaito
6 - reflutter :
https://github.com/ptswarm/reFlutter
7 - B(l)utter :
https://github.com/worawit/blutter
8 - Apktool :
> official website :
https://apktool.org/
> github :
https://github.com/iBotPeaches/Apktool
9 - Jadx-gui :
https://github.com/skylot/jadx
10 - dnSpy :
https://github.com/dnSpy/dnSpy
11 - Binary Ninja :
https://binary.ninja/
12 - x64dbg :
https://x64dbg.com/
1 - radare2 :
> official website :
https://rada.re/n/
> github :
https://github.com/radareorg
2 - Ghidra :
> official website :
https://ghidra-sre.org/
> github :
https://github.com/NationalSecurityAgency/ghidra
3 - IDA Free / IDA Pro (Hex-Rays) :
https://hex-rays.com
4 - Cutter :
> official website :
https://cutter.re/
> github :
https://github.com/rizinorg/cutter
5 - iaito :
> official website :
https://rada.re/n/iaito.html
> github :
https://github.com/radareorg/iaito
6 - reflutter :
https://github.com/ptswarm/reFlutter
7 - B(l)utter :
https://github.com/worawit/blutter
8 - Apktool :
> official website :
https://apktool.org/
> github :
https://github.com/iBotPeaches/Apktool
9 - Jadx-gui :
https://github.com/skylot/jadx
10 - dnSpy :
https://github.com/dnSpy/dnSpy
11 - Binary Ninja :
https://binary.ninja/
12 - x64dbg :
https://x64dbg.com/
❤6⚡5👏1
reverse engineering
If you are asking about this This is a solution for the owasp challenge UnCrackable-Level2 In this tutorial you will learn how to analyze full the app and understand its behavior, to bypass root detection by Frida and manually by patching the app, find the…
Some resources in the video
I am not uploading now because it is late and my battery is going to die
I am not uploading now because it is late and my battery is going to die
❤2
Media is too big
VIEW IN TELEGRAM
➜ Solving OWASP's challenge UnCrackable-Level2
➜ You can consider this video a crash course (Beginner Friendly)
➜ APK full analysis
❍ Tools and Resources :
➜ Keep Supporting Us @reverseengineer101
➜ You can consider this video a crash course (Beginner Friendly)
➜ APK full analysis
⚠ This app is made for security testing and reverse engineering propuses
❍ Tools and Resources :
🔗App link : https://mas.owasp.org/crackmes/Android/#android-uncrackable-l2
◉ Frida releases : https://github.com/frida/frida/releases/tag/16.4.8
◉ Radare2 :
https://rada.re/n/
◉ Jadx-gui :
https://github.com/skylot/jadx
◉ APKtool :
https://apktool.org/
◉ Keytool :
https://docs.oracle.com/javase/8/docs/technotes/tools/unix/keytool.html
◉ Jarsigner :
https://docs.oracle.com/javase/8/docs/technotes/tools/windows/jarsigner.html
◉ adb :
https://developer.android.com/tools/adb?hl=ar
⊷ Genymotion :
https://www.genymotion.com/
◉ Java :
https://www.java.com/en/
◉ Python :
https://www.python.org/
⊷ If you are interested about the OS (Kali Linux) :
https://www.kali.org/
➜ Keep Supporting Us @reverseengineer101
🔥11👏3👌2👍1
reverse engineering
➜ Solving OWASP's challenge UnCrackable-Level2 ➜ You can consider this video a crash course (Beginner Friendly) ➜ APK full analysis ⚠ This app is made for security testing and reverse engineering propuses ❍ Tools and Resources : 🔗App link : https://…
I will upload on YouTube ASAP
😘5❤1
Forwarded from Useful Patches
🚀 Introducing SigTool: APK Signature Analyzer Pro
SigTool is an open-source tool designed for developers and security analysts to perform in-depth APK signature analysis. It offers:
- Signature Extraction & Hash Calculation
- Java-style HashCode Calculation
- PEM Certificate Generation
🔗 GitHub Repository:
https://github.com/muhammadrizwan87/sigtool
✅ Requirements:
📦 Install:
💡 Usage:
Your feedback and contributions are welcome! If you find it helpful, don’t forget to star ⭐ the repo and share it with your peers.
━━━━━━━━━━━━━━━━━━━
♻️ Join Channel: @Android_Patches
📣 Second Channel: @TDOhex
💬 Discussion Group: @TDOhex_Discussion
━━━━━━━━━━━━━━━━━━━
SigTool is an open-source tool designed for developers and security analysts to perform in-depth APK signature analysis. It offers:
- Signature Extraction & Hash Calculation
- Java-style HashCode Calculation
- PEM Certificate Generation
🔗 GitHub Repository:
https://github.com/muhammadrizwan87/sigtool
✅ Requirements:
pkg install python aapt openssl-tool 📦 Install:
pip install sigtool 💡 Usage:
sigtool -hYour feedback and contributions are welcome! If you find it helpful, don’t forget to star ⭐ the repo and share it with your peers.
━━━━━━━━━━━━━━━━━━━
♻️ Join Channel: @Android_Patches
📣 Second Channel: @TDOhex
💬 Discussion Group: @TDOhex_Discussion
━━━━━━━━━━━━━━━━━━━
🔥2🤣2👍1
Do you know about
You can run various Linux distributions on your Windows via wsl like Ubuntu, kali linux or Arch linux
Note :
To-do :
1 - Open cmd
2 - run :
To see more info
3 - you can run
4 - To uninstall run :
Visit Microsoft official website to know more
wsl
wsl (Windows Sub-system for Linux) commandYou can run various Linux distributions on your Windows via wsl like Ubuntu, kali linux or Arch linux
Note :
This feature isn't coming as a pre-installed program with windows, so you have to install manually
To-do :
1 - Open cmd
2 - run :
wsl --help
To see more info
3 - you can run
wsl --install -d <DistroName>
4 - To uninstall run :
wsl --uninstall
Visit Microsoft official website to know more
Docs
Install WSL
Install Windows Subsystem for Linux with the command, wsl --install. Use a Bash terminal on your Windows machine run by your preferred Linux distribution - Ubuntu, Debian, SUSE, Kali, Fedora, Pengwin, Alpine, and more are available.
👍4
❤4🔥2
Useful Channels 🔥
@android_reverse
@android_reverse2
Can be a great resources for courses, tools and more 😉
@android_reverse
@android_reverse2
Can be a great resources for courses, tools and more 😉
🥰4👍3❤2🔥1
Soon another tutorial about android reverse engineering 🔥
Give reactions, keep supporting
Give reactions, keep supporting
🔥16❤5❤🔥3👍2😁1
If are an Android user like most of us, please check unknown apps before installing or don't even do
Here 👆 is an example of a spy app you can always take a look in AndroidManifest.xml to check the permissions, accessibility, and some actions
Here 👆 is an example of a spy app you can always take a look in AndroidManifest.xml to check the permissions, accessibility, and some actions
👍8❤4👏1
reverse engineering
Photo
AndroidManifest.xml
27.5 KB
Here is the decompiled AndroidManifest.xml of the app if you want to take a look
/* decompiled by jadx */
/* decompiled by jadx */
❤5👍2👏2