Posted on:
Last modified:
mkdir jadx
git clone https://github.com/skylot/jadx.git
cd jadx
./gradlew dist # you might need to wait on this
或者直接 brew install jadx
apk studio
如何 sign:https://www.nevermoe.com/?p=373
smali code tutorial: https://forum.xda-developers.com/showthread.php?t=2193735
一篇很好的 pdf 的文档,利用 smali code:http://www.security-assessment.com/files/documents/whitepapers/Bypassing%20SSL%20Pinning%20on%20Android%20via%20Reverse%20Engineering.pdf
安卓中 pinning 的原理
使用自己的 keystore 实例化 TrustManagerFactory
关键语句
InputStream in = resources.openRawResource(certificateRawResource);//file name of res/raw keyStore = KeyStore.getInstance("BKS"); keyStore.load(resourceStream, password);
http://fdwills.github.io/diary/2014/06/13/ssl-pinning.html
一些现成的 工具
https://github.com/ac-pm/SSLUnpinning_Xposed xposed 插件,已测试不好用 https://github.com/iSECPartners/Android-SSL-TrustKiller 需要 cydia
豌豆荚商店中有一个 xposed installer miui 专版,使用这个可以很好地安装 xposed
之后安装
另一只种思路,找到,找到 bks 文件,替换掉,重新打包,签名
另外一些工具
https://github.com/ac-pm/Inspeckage
https://github.com/iSECPartners/Android-SSL-TrustKiller 需要 cydia
https://github.com/iSECPartners/android-ssl-bypass 一个基础工具,通过替换 trust manager 实现
arm 汇编教程
© 2016-2022 Yifei Kong. Powered by ynotes
All contents are under the CC-BY-NC-SA license, if not otherwise specified.
Opinions expressed here are solely my own and do not express the views or opinions of my employer.
友情链接: MySQL 教程站