1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 | android app 진단 시 자주사용되는 명령어 [apktool, sign] java -jar apktool d -r [apk] java -jar apktool d [apk] java -jar apktool b [폴더] -o [만들이름.apk] java -jar signapk.jar testkey.x509.pem testkey.pk8 [서명할 APK 이름] [서명 후의 APK 명] [액티비티 호출] 현재 액티비티 nox_adb shell "dumpsys window windows" | grep -E "mCurrentFouce|mFocusedApp" adb shell "dumpsys activity activities | grep ResumedActivity" adb shell "dumpsys activity activities | grep *Activity*" 액티비티 강제호출 ex) nox_adb shell am start -n com.aton.electronicreceipt/.activity.MainActivity adb shell "am start -a android.intent.action.MAIN -n [패키지명]/[호출할 Activity명]" [Android 백업허용] 1) adb backup [패키지명] -f [백업명.ab] 2) 안드로이드기기에서 백업 비밀번호 입력 3) C:\Users\hackyu\Desktop\MobileTool\Android\android-backup-tookit\android-backup-extractor\android-backup-extractor-20180521-bin 로 이동 후 java -jar abe.jar unpack [이름.ab] [이름.tar] [smali 변경 및 추가] const-string v0, "xxxx" const/4 v1, 0x0 invoke-static {p0, v0, v1}, Landroid/widget/Toast;->makeText(Landroid/content/Context;Ljava/lang/CharSequence;I)Landroid/widget/Toast; move-result-object v0 invoke-virtual {v0}, Landroid/widget/Toast;->show()V | cs |
'Development & Security > mobile' 카테고리의 다른 글
CrackerXI(Cydia Tweak) - iOS 11이상 복호화 IPA 추출 (0) | 2021.01.31 |
---|