Second, the reverse analysis
But today our theme is to crack the charging function inside this tool, use this tool to crack the tutorial and then give the article. Today we will explode the charging function of this app. Not much to say,
This prompt will appear when we look at some functions in the arsc file. Ok, take this prompt as a breakthrough, decompile apk with apktool, and then look at his:
Seeing this, it is very confusing, and you will find that the resources inside apk are all defined in this format. Here, you can guess that apk has confused resources. After we open apk with Jadx, we can't find this name value globally, and we will find that it is all defined like this, so this author is a strategy to protect apk. But it doesn't matter. More disgusting protection is yet to come. Let me analyze it. However, in the end, we must use the int value 0x7FXXXX to operate in the smali code, so that we can search the file containing the value 0x7f08009e in the smali code directory globally. Here we need to use the command findstr in the window:
The order is simple. Finds all files containing the contents of the specified string in the current directory: findstr /s /i "Find contents"
We can see that there are only a few files in total. We won't search every file here, and then determine whether it is this file. Everyone can operate by themselves, and you can check the positioning in turn. I finally found this file. Let's open this file and have a look:
Remember to call this string information on line 157 of the code, and then we can look up this class in Jadx.