Android apps under the microscope

Alexey Alter-Pesotskiy
testableapple
Published in
1 min readApr 6, 2019

This Note originally published on my Personal Blog here. Read original note so that you won’t miss any content.

Would you like to look under the hood of any android app?

You are welcome! (:

Precondition

  • dex2jar — tool for converting .dex file to .class files
$ brew install dex2jar
  • jd-gui — tool for decompiling and analysing Java “byte code”
$ brew cask install jd-gui

Let’s go

1. First of all we should get the .apk. If you haven’t one, you are able to download it from store (for more info read this xcnote).

2. Then we need to convert our .apk into the classes (.jar):

$ d2j-dex2jar test.apk -o test.jar

3. Eventually we should just decompile received .jar and look under the hood:

$ open -a jd-gui test.jar

Conclusion

Today we affect two awesome tools — dex2jar and jd-gui. Suggest you to put them into practice. Perhaps it will be a deeply fascinating diving in reverse engineering. If you have any questions, feel free to put them in the comments.

See you later (:

--

--