BSides London 2015 - 3rd June 2015
Paul/Etienne @SensePost.com
@PaulWebSec/@kamp_staaldraad
Static analysis (dex2jar, baksmali, androguard, jadx, ...)
Dynamic analysis (Droidbox)
APK = ZIP Archive
unzip /path/to/file.apk
*.dex files
DEX file = Dalvik EXecutable file
Next step is to convert it to a JAR archive
$ /path/to/d2j-dex2jar.sh /path/to/file.dex
Will result in a JAR archive that you can now inspect
Disassembles/Decompiles Android apps
Different tools: androlyze, androdis, androauto, ...
$ python androlyze.py -i
Text