How to reverse engineer an android application?

8

As an android application in the .apk extension, get the classes, layouts, libraries, etc., ie reverse engineering?

Note: I used 7-zip as Bacco advised and resulted in the following files folder:

The classes appear in this extension .dex and resources in the extension .arsc, because I think they are protected, how to access the classes and resources of this application?

    
asked by anonymous 04.10.2014 / 20:47

1 answer

14

You have some tools for this:

  • 7-Zip can be used to unzip .apk ;

  • A dex2jar converts .dex files to .jar ;

    d2j-dex2jar.sh -f -o saida.jar entrada.apk  (linux)
    d2j-dex2jar.bat -f -o saida.jar entrada.apk (windows)
    
  • The jd-gui serves to view the contents of jar .

    
04.10.2014 / 21:27