Skip to Content
Practical Mobile Forensics - Fourth Edition
book

Practical Mobile Forensics - Fourth Edition

by Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
April 2020
Intermediate to advanced
400 pages
10h 12m
English
Packt Publishing
Content preview from Practical Mobile Forensics - Fourth Edition

Steps to reverse engineer Android apps

APK files can be reverse-engineered in different ways to get the original code. The following is one method that uses the dex2jar and JD-GUI tools to gain access to the application code. For our example, we will examine the com.twitter.android-1.apk file. The following are the steps to successfully reverse engineer the APK file:

  1. Rename the APK extension to ZIP to see the contents of the file. Rename the com.twitter.android-1.apk file to twitter.android-1.zip and extract the contents of this file using any file archiver application. The following screenshot shows the files that were extracted from the original file, twitter.android-1.zip:
Extracted files of an APK file
  1. The classes.dex file that we ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Mobile Forensics - Second Edition

Practical Mobile Forensics - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty
Practical Mobile Forensics - Third Edition

Practical Mobile Forensics - Third Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Publisher Resources

ISBN: 9781838647520