In continuation of the Android APK Reverse Engineering series, this post will cover how to actually start digging into an APK’s programming logic. My last blog post detailed how to unzip an APK archive and what contents are within. While it’s useful to an extent, it’s not helpful in reading and understanding the programming logic. Remember the code itself is in binary format … [Read more...]
Android APK Reverse Engineering: What’s in an APK
Before building off the previous post, I wanted to take a moment and clarify the objective of this series. The purpose of this series is to break down the APK reverse engineering process into smaller chunks in order to really appreciate each step. As we progress through the series, I want readers to be able to build off of the previous post and see how all the pieces tie … [Read more...]
Android APK Reverse Engineering: Before Getting Started
In my endless pursuit of growth and development, I have decided to take on another challenge: malicious Android application research. There have been many stories of researchers finding malicious mobile applications either trying to steal your private information or presenting a barrage of annoying ads generating revenue – it seems that new stories come out semi-regularly. That … [Read more...]