In this video walkthrough, we covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to decompile an android APK sample to uncover and extract any hardcoded and encrypted key values. We discovered that the app implements a function to employs an encryption routine to check whether the user's provided-input matches an encrypted value in order to decide whether to give perks or not. Frida is another tool that can be used to dynamically analyze a running Android app and if given the right process ID it may be able to recover encrypted values.
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
/ @motasemhamdan
******
Writeup
https://motasem-notes.net/android-rev...
Frida Link
https://frida.re
********
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6ai...
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb42481b2
Instagram
/ motasem.hamdan.official
Twitter
/ manmotasem
Facebook
/ motasemhamdantty