From the course: Ethical Hacking: Mobile Devices and Platforms
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Recreating Java source code with JAD - iOS Tutorial
From the course: Ethical Hacking: Mobile Devices and Platforms
Recreating Java source code with JAD
- [Instructor] We've seen how we can read source code through the JD GUI tool. We can also recover the source code through the command line, using the Jad tool. This reads an Android application's class files, and provides proper source code outputs in individual text files. Jad hasn't kept pace with Java development, but it's still a potentially useful alternative to JD GUI. The Jad executable is available as a download from the Varaneckas website. I've downloaded it and extracted the contents, the Jad executable, into my testing directory. As with JD GUI, an APK file must be converted into a JAR file using DEXtoJar before we can process it. I'll again use the SMS reader application to demonstrate Jad, and use the jar file I've already created. The Jad tool works on class files, so I've copied the Jar file into the Jad directory, and changed its extension to .zip. I'll burrow down from the DE directory, until we find…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Understanding the Android operating system6m 38s
-
(Locked)
Understanding the Android security model4m 46s
-
(Locked)
Preparing for Android testing1m 38s
-
(Locked)
Extracting and reading the manifest file7m 28s
-
(Locked)
Extracting and reading JavaScript code5m 22s
-
(Locked)
Recreating Java source code with JAD2m 23s
-
(Locked)
Browsing applications directly with JADX2m 3s
-
(Locked)
Getting command-line access with ADB5m 23s
-
(Locked)
Install an Android emulator from the SDK2m 14s
-
(Locked)
Dynamic analysis of Android applications5m 49s
-
(Locked)
Using Drozer to analyze applications4m 54s
-
(Locked)
Checking for scam phones2m 52s
-
(Locked)
-
-
-