Labels

.NET Acronis Backup activate easytether ADB ALL MOBILE RESAT KEY amoled Android Android 4.3 Android 4.4 Android Games Android Lollipop Android M android tether android tether fedora android tether mac android tether ubuntu android tether windows Antivirus/Security AOMEI aosp appanite ripoff appanite scam Areca Argentum Backup Azure SDK 2.9 Backup BackUp Maker Backup4all BackupAssist Battery Saving blackberry 10 tethering blackberry easytether blackberry tether Books & Reference Browsers Business Software Camera charging checkbox Customization cyber week sale Data Recovery Samsung Desktop Enhancements Developer Analytics Tools developers beware DirSync EaseUS easytether easytether activate easytether activation code easytether activation key easytether apk easytether app world easytether code easytether deal easytether drivers easytether full apk easytether key easytether sale easytether verizon easytether with fedora Educaton Extension auto-update FBackup find Galaxy Note data Find Lost Samsung Data from Formatted or Corrupted Memory FREE Free samsung flash software for all samsung model wiht direction free sony mobile flash soft and coad galaxy note photo recovery GalaxyS6 Games Get back Deleted Data from Samsung get back lost data from Samsung get back samsung galaxy files gridview H4ck1ng Hacking WiFi Password kindle tether kindle tethering Launcher Leaked LG G2 LG G3 LG G4 lockscreen Macrium Reflect material design mobihand android mobihand nonpayment mobihand payment mobihand ripoff multitasking mybackup Node.js Tools 1.2 Alpha OleDbConnection OnePlus Paragon ported apps Python Tools for Visual Studio 2.2.3 QILING recover data from samsung recover lost data on Samsung Galaxy Note 7 resize restore samsung galaxy note retrieve data from samsung phone retrieve deleted data on galaxy note 7 retrieve deleted files from samsung galaxy note retrieve lost photos from note 7 richard wood ripoff ROMs root samsung data recovery tool Samsung Galaxy Note Data Recovery Samsung Internal Memory Recovery samsung sd card recovery Screen sebastian dijmarescu ripoff stolen royalties System.Data.OleDb tablet tether tablet tethering undelete data from samsung note 7 undelete galaxy note data Universal Windows Platform Tools unpaid developers useful tools verizon tether Visual Studio 2015 Update 2 walkthrough wd smartware www.mobihand.com xposed framework

Reverse Engineering - How Android apps get hacked?

Reverse engineering is the process of "disassembling" a software followed by certain edits and moficiation that aims to recover what's behind the interface and a fully functional app. People who do this process, however, are planning to change the software's source code and exploit the app. Software cracks, keyloggers, those all are products of revers eengineering. As you might guess, reverse engineering can be quite dangerous for us - the users.)

Security is obviously the number one priority. Although we are all trying to protect our personal data as much as possible, it's still not effective enough.


 

Here's a little info from Arxan Technologies showing us that 70% of Apple apps have been in some way hacked and 95% of apps have been hacked on Android.
The question stays, is really hacking & modifying (or injecting a malicious code) an app that easy?
Let's have a look.



Here's another quick video showing the decompilation of an application using the dex2jar and JD-GUI which shows the source code of the decompiled app.

You can use the same thing using Show Java on Android, download on Google Play


The code gets changed, app compiled and released to the public. You can't spot the difference as the app is behaving normally but your personal data may get stolen.

These threads may be everywhere, for example if you like to download paid apps for free on the web (APK file), these also may be modified.

0 Response to "Reverse Engineering - How Android apps get hacked?"

Post a Comment