This commit is contained in:
parent
19286eba61
commit
eb35d092ac
10 changed files with 170 additions and 43 deletions
|
@ -16,7 +16,7 @@ Among the notable tools in the #SDK, they are:
|
|||
|
||||
- `emulator`: an Android emulator.
|
||||
This tools allow to run an emulated Android phone on a computer.
|
||||
Although very usefull, Android emulator has several limitation.
|
||||
Although very useful, Android emulator has several limitation.
|
||||
For once, it cannot emulate another achitecture.
|
||||
An x86_64 computer cannot emulate an ARM smartphone.
|
||||
This can be an issue because a majority of smartphone run on ARM processor.
|
||||
|
@ -55,7 +55,7 @@ In addition, it can perform additionnal analysis, like computing a call graph or
|
|||
|
||||
Jadx#footnote[https://github.com/skylot/jadx] is an application decompiler.
|
||||
It convert #DEX files to Java source code.
|
||||
It is not always capable of decompiling all classes of an application, so it cannot be used to recompile a new application, but the code generated can be verry helpfull to reverse an application.
|
||||
It is not always capable of decompiling all classes of an application, so it cannot be used to recompile a new application, but the code generated can be very helpful to reverse an application.
|
||||
In addition to decompilling #DEX files, Jadx can also decode Android manifests and application ressources.
|
||||
|
||||
=== Soot <sec:bg-soot>
|
||||
|
@ -83,7 +83,7 @@ Malware might implement countermeasures that avoid running malicious payload in
|
|||
|
||||
#v(2em)
|
||||
|
||||
Those tools are quite usefull for manual operations.
|
||||
Those tools are quite useful for manual operations.
|
||||
However, considering the complexity of modern Android applications, it might take a lot of work for a reverse engineer to analyse one application.
|
||||
In the next section, we will see more advance techniques that have been developped to analyse Android applications.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue