reverse engineering
3.43K subscribers
73 photos
11 videos
25 files
126 links
◉ A channel for learning and discussing about reverse engineering

◉ We aren't accepting any illegal works, we are here to help, learn and gain new skills
◉ Owner @Mohamed_Abozaid1
◉ Egypt 🇪🇬

Please don't PM ask in discussion group except in necessity
Download Telegram
Something great is coming 😉

@reverseengineer101
5👍4🔥31
reverse engineering
Something great is coming 😉 @reverseengineer101
If you are asking about this
This is a solution for the owasp challenge UnCrackable-Level2
In this tutorial you will learn how to analyze full the app and understand its behavior, to bypass root detection by Frida and manually by patching the app, find the activation code which will be in the native code and this will open your eyes on how the integration between java codes and native codes is also what is JNI at the and finally how to patch disassembly by radare2 to bypass the checks of the secret code and more !

I know that there are a lot of people solved that change but I worked on it in a different way with various methods to solve problems
👍65👏1
Tools you should know :

1 - radare2 :
> official website :
https://rada.re/n/
> github :
https://github.com/radareorg

2 - Ghidra :
> official website :
https://ghidra-sre.org/
> github :
https://github.com/NationalSecurityAgency/ghidra

3 - IDA Free / IDA Pro (Hex-Rays) :
https://hex-rays.com

4 - Cutter :
> official website :
https://cutter.re/
> github :
https://github.com/rizinorg/cutter

5 - iaito :
> official website :
https://rada.re/n/iaito.html
> github :
https://github.com/radareorg/iaito

6 - reflutter :
https://github.com/ptswarm/reFlutter

7 - B(l)utter :
https://github.com/worawit/blutter

8 - Apktool :
> official website :
https://apktool.org/
> github :
https://github.com/iBotPeaches/Apktool

9 - Jadx-gui :
https://github.com/skylot/jadx

10 - dnSpy :
https://github.com/dnSpy/dnSpy

11 - Binary Ninja :
https://binary.ninja/

12 - x64dbg :
https://x64dbg.com/
65👏1
Media is too big
VIEW IN TELEGRAM
Solving OWASP's challenge UnCrackable-Level2

You can consider this video a crash course (Beginner Friendly)

APK full analysis

This app is made for security testing and reverse engineering propuses


Tools and Resources :

🔗App link : https://mas.owasp.org/crackmes/Android/#android-uncrackable-l2

◉ Frida releases : https://github.com/frida/frida/releases/tag/16.4.8

◉ Radare2 :
https://rada.re/n/

◉ Jadx-gui :
https://github.com/skylot/jadx

◉ APKtool :
https://apktool.org/

◉ Keytool :
https://docs.oracle.com/javase/8/docs/technotes/tools/unix/keytool.html

◉ Jarsigner :
https://docs.oracle.com/javase/8/docs/technotes/tools/windows/jarsigner.html

◉ adb :
https://developer.android.com/tools/adb?hl=ar

⊷ Genymotion :
https://www.genymotion.com/

◉ Java :
https://www.java.com/en/

◉ Python :
https://www.python.org/

⊷ If you are interested about the OS (Kali Linux) :
https://www.kali.org/


➜ Keep Supporting Us @reverseengineer101
🔥11👏3👌2👍1
Forwarded from Useful Patches
🚀 Introducing SigTool: APK Signature Analyzer Pro 

SigTool is an open-source tool designed for developers and security analysts to perform in-depth APK signature analysis. It offers:

- Signature Extraction & Hash Calculation
- Java-style HashCode Calculation
- PEM Certificate Generation

🔗 GitHub Repository:
https://github.com/muhammadrizwan87/sigtool
Requirements: pkg install python aapt openssl-tool
📦 Install: pip install sigtool
💡 Usage: sigtool -h

Your feedback and contributions are welcome! If you find it helpful, don’t forget to star the repo and share it with your peers.
━━━━━━━━━━━━━━━━━━━
♻️ Join Channel:
@Android_Patches
📣 Second Channel:
@TDOhex
💬 Discussion Group:
@TDOhex_Discussion
━━━━━━━━━━━━━━━━━━━
🔥2🤣2👍1
Do you know about
wsl

wsl (Windows Sub-system for Linux) command

You can run various Linux distributions on your Windows via wsl like Ubuntu, kali linux or Arch linux

Note :
This feature isn't coming as a pre-installed program with windows, so you have to install manually

To-do :
1 - Open cmd
2 - run :
wsl --help

To see more info
3 - you can run
wsl --install -d <DistroName>

4 - To uninstall run :
wsl --uninstall

Visit Microsoft official website to know more
👍4
Arm v7 (32 bit)assembly course from free code camp

https://youtu.be/gfmRrPjnEw4
4🔥2
Useful Channels 🔥

@android_reverse
@android_reverse2

Can be a great resources for courses, tools and more 😉
🥰4👍32🔥1
Soon another tutorial about android reverse engineering 🔥

Give reactions, keep supporting
🔥165❤‍🔥3👍2😁1
If are an Android user like most of us, please check unknown apps before installing or don't even do

Here 👆 is an example of a spy app you can always take a look in AndroidManifest.xml to check the permissions, accessibility, and some actions
👍84👏1
reverse engineering
Photo
AndroidManifest.xml
27.5 KB
Here is the decompiled AndroidManifest.xml of the app if you want to take a look
/* decompiled by jadx */
5👍2👏2