My Instagram

Android Application Reverse Engineering Tutorial

New Android Application Reverse Engineering Tutorial

The above link posted by DragoN HearT is Pro version of program, but I found that once I installed & Run on my Mobile, a Pop-Up opened saying "This is Illegal Copy". Android Application Reverse Engineering Tutorial Android Application Reverse Engineering Tutorial Android Application Reverse Engineering Tutorial
Android Application Reverse Engineering Tutorial
The above link posted by DragoN HearT is Pro version of program, but I found that once I installed & Run on my Mobile, a Pop-Up opened saying "This is Illegal Copy". Very Sad actually :-) So I thought to give a try to remove the Nag Screen... [I have Windows 7 64bit, however, instruction will remain the same for other OS also] Step 1: I have downloaded APKtook from Link no. 1 above, apktool-install-windows-r04-brut1.tar.bz2 & apktool1.4.3.tar.bz2 Extracted them & put all three files [aapt.exe, apktool.bat & apktool.jar] in a same folder. Step 2:I have copied SARP.apk in the same folder of apktool Step 3:Run the following command in command prompt inside that folder: apktool d SARP.apk SARP This will create a directory named SARP in same folder. Step 4: a) Goto SARP folder. b) then navigate to smali\com\terboel\sarp folder. c) here you will see a lot of *.smali files [These are Java source code files & can be opened in Notepad] As we are interested to remove "Illegal Copy" I searched withing files to know which file contains the Text "Illegal Copy" and I found that "SarpActivity.smali" contains the Text "Illegal Copy" :-) If we examine the file, we can found that the following ".method private warnAboutIllegalAppCopy()V" initiate the Pop-up of "Illegal Copy" when it found that the installation source is other than Google. --------------------Code Start---------------------- .method private warnAboutIllegalAppCopy()V .locals 4 .prologue .line 240 invoke-virtual {p0}, Lcom/terboel/sarp/SarpActivity;->getPackageManager()Landroid/content/pm/PackageManager .line 241 .local v1, pm:Landroid/content/pm/PackageManager; invoke-virtual {p0}, Lcom/terboel/sarp/SarpActivity;->getPackageName()Ljava/lang/String; move-result-object v2 invoke-virtual {v1, v2}, Landroid/content/pm/PackageManager;->getInstallerPackageName(Ljava/lang/StringLjava/lang/String; move-result-
 PLAY LINK:  Android Application Reverse Engineering Tutorial
Download Links:
Download
Download
Download

No comments