#1
|
|||
|
|||
decompile huawei android system app&apk
Hi all,
I want to de-compile and reverse Huawei android applications for example it's File Manager app to find how 'SafeBox' feature works. to be clear SafeBox is a feature that we can protect files with password. the problem is ApkTool or other decompilers can't process and raise error. Code:
java -jar apktool_2.1.1.jar d -f safebox.apk Code:
Exception in thread "main" brut.androlib.AndrolibException: Multiple resources: spec=0x7f0b0166 string/tab_item_bookmarks, config=-es-rUS at brut.androlib.res.data.ResType.addResource(ResType.java:66) at brut.androlib.res.data.ResType.addResource(ResType.java:55) at brut.androlib.res.decoder.ARSCDecoder.readEntry(ARSCDecoder.java:261) at brut.androlib.res.decoder.ARSCDecoder.readTableType(ARSCDecoder.java:217) at brut.androlib.res.decoder.ARSCDecoder.readTableTypeSpec(ARSCDecoder.java:153) at brut.androlib.res.decoder.ARSCDecoder.readTablePackage(ARSCDecoder.java:115) at brut.androlib.res.decoder.ARSCDecoder.readTableHeader(ARSCDecoder.java:77) at brut.androlib.res.decoder.ARSCDecoder.decode(ARSCDecoder.java:47) at brut.androlib.res.AndrolibResources.getResPackagesFromApk(AndrolibResources.java:555) at brut.androlib.res.AndrolibResources.loadMainPkg(AndrolibResources.java:72) at brut.androlib.res.AndrolibResources.getResTable(AndrolibResources.java:64) at brut.androlib.Androlib.getResTable(Androlib.java:64) at brut.androlib.ApkDecoder.setTargetSdkVersion(ApkDecoder.java:193) at brut.androlib.ApkDecoder.decode(ApkDecoder.java:102) at brut.apktool.Main.cmdDecode(Main.java:163) at brut.apktool.Main.main(Main.java:81) here is my apk: Code:
http://www.mediafire.com/download/z98ub9u51ua23o3/safebox.rar Able. |
#2
|
|||
|
|||
The file could be a resource-only apk, as there's no java code. But it could also be because there's a companion *.odex file which you didn't include. Looking at the manifest it looks like the 2nd option.
If the apktool's developer can't solve it easily, I doubt you'll find on this forum specialized help. One advice I can give you is to use -r with apktool to have a look at the code (assuming there is indeed some), or use JEB to explore the code in an interactive manner. For resources, use aapt.exe (from Android SDK tools) to list and inspect the resources, including the manifest: Code:
aapt l -a safebox.apk - the resources stored as standalone files (e.g. png's) - the resources compiled in resources.arsc - the manifest structure (verbose) You can also use other aapt options to actually list the resource values, e.g. "aapt.exe d --values resources safebox.apk" The apk also contains a native lib (libhidisk_security.so) which you can explore with IDA, but the logic that will invoke the entry points will be in java code. There are functions to encrypt and decrypt, but apparently only for the raw operations. Managing the keys and files is probably in the java part. |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Microblaze decompile | eychei | General Discussion | 4 | 09-07-2018 08:27 |
Q: about decompile apk & Recompile apk | Utshiha | General Discussion | 7 | 12-17-2016 23:07 |