• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering NinjaDroid - Ninja Reverse Engineering On Android APK Packages

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,613
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,650
‎6 Years of Service‎
 
76%
ninjadroid.gif


Overview

NinjaDroid uses AXMLParser together with a series of Python scripts based on aapt, keytool, string and such to extract a series of information from a given APK package, such as:

    List of files of the APK: file name, size, MD5, SHA-1, SHA-256 and SHA-512
    AndroidManifest.xml info: app name, package name, version, sdks, permissions, activities, services, broadcast-receivers, ...
    CERT.RSA/DSA digital certificate info: serial number, validity, fingerprint, issuer and owner
    List of URLs, shell commands and other generic strings hard-coded into the classes.dex files

Furthermore, NinjaDroid uses apktool and dex2jar to extract and store:

    JSON report file, which contains all the extracted APK info
    AndroidManifest.xml file (thanks to apktool)
    CERT.RSA/DSA digital certificate file
    classes.dex files
    translated .jar file (thanks to dex2jar)
    disassembled smali files (thanks to apktool)
    assets/ and res/ folders together with their content (thanks to apktool)

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top