Android Application Reverse Engineering Tutorial
Android Application Reverse Engineering Tutorial
The above link posted by DragoN HearT is Pro version of program, but I found that once I installed & Run on my Mobile, a Pop-Up opened saying "This is Illegal Copy".
Android Application Reverse Engineering Tutorial
The above link posted by DragoN HearT is Pro version of program, but I found that once I installed & Run on my Mobile, a Pop-Up opened saying "This is Illegal Copy". Very Sad actually :-) So I thought to give a try to remove the Nag Screen... [I have Windows 7 64bit, however, instruction will remain the same for other OS also] Step 1: I have downloaded APKtook from Link no. 1 above, apktool-install-windows-r04-brut1.tar.bz2 & apktool1.4.3.tar.bz2 Extracted them & put all three files [aapt.exe, apktool.bat & apktool.jar] in a same folder. Step 2:I have copied SARP.apk in the same folder of apktool Step 3:Run the following command in command prompt inside that folder: apktool d SARP.apk SARP This will create a directory named SARP in same folder. Step 4: a) Goto SARP folder. b) then navigate to smali\com\terboel\sarp folder. c) here you will see a lot of *.smali files [These are Java source code files & can be opened in Notepad] As we are interested to remove "Illegal Copy" I searched withing files to know which file contains the Text "Illegal Copy" and I found that "SarpActivity.smali" contains the Text "Illegal Copy" :-) If we examine the file, we can found that the following ".method private warnAboutIllegalAppCopy()V" initiate the Pop-up of "Illegal Copy" when it found that the installation source is other than Google. --------------------Code Start---------------------- .method private warnAboutIllegalAppCopy()V .locals 4 .prologue .line 240 invoke-virtual {p0}, Lcom/terboel/sarp/SarpActivity;->getPackageManager()Landroid/content/pm/PackageManager .line 241 .local v1, pm:Landroid/content/pm/PackageManager; invoke-virtual {p0}, Lcom/terboel/sarp/SarpActivity;->getPackageName()Ljava/lang/String; move-result-object v2 invoke-virtual {v1, v2}, Landroid/content/pm/PackageManager;->getInstallerPackageName(Ljava/lang/StringLjava/lang/String; move-result-PLAY LINK: Android Application Reverse Engineering Tutorial
Download Links:
Download
Download
Download
Post a Comment