Current location - Quotes Website - Personality signature - Method of cracking mt manager by permanent vip
Method of cracking mt manager by permanent vip
When cracking the app, we are almost always operating on the PC side, but the MT manager of Binshen can be cracked directly on the mobile phone side, but it also has great limitations, but it is no problem for some simple app cracking. In fact, the principle of this tool is also very simple, that is, parsing files such as DEX and ARSC in apk, and then supporting the modification of class method information and resource information, and then packaging and signing for the second time. In fact, this part of the function has been moved to the mobile terminal, but it is admirable that the overall effect of this app is very good, and I also admire the author of this tool very much.

Second, the reverse analysis

But today our theme is to crack the charging function inside this tool, use this tool to crack the tutorial and then give the article. Today we will explode the charging function of this app. Not much to say,

This prompt will appear when we look at some functions in the arsc file. Ok, take this prompt as a breakthrough, decompile apk with apktool, and then look at his:

Seeing this, it is very confusing, and you will find that the resources inside apk are all defined in this format. Here, you can guess that apk has confused resources. After we open apk with Jadx, we can't find this name value globally, and we will find that it is all defined like this, so this author is a strategy to protect apk. But it doesn't matter. More disgusting protection is yet to come. Let me analyze it. However, in the end, we must use the int value 0x7FXXXX to operate in the smali code, so that we can search the file containing the value 0x7f08009e in the smali code directory globally. Here we need to use the command findstr in the window:

The order is simple. Finds all files containing the contents of the specified string in the current directory: findstr /s /i "Find contents"

We can see that there are only a few files in total. We won't search every file here, and then determine whether it is this file. Everyone can operate by themselves, and you can check the positioning in turn. I finally found this file. Let's open this file and have a look:

Remember to call this string information on line 157 of the code, and then we can look up this class in Jadx.