Full-Stack

Welcome Portfolio Projects Contact
↑ Go Back ↑

Android Reverse Engineering

Android Reverse Engineering

Download APK from Play Store

The first step is go get an APK package from the app to be changed.

If it is an app on the PlayStore, the following website can be used:

  • https://apkcombo.com

Or if open source solution a tool to download here:

  • https://raccoon.onyxbits.de/

Extract, Decompile APK to smali code:

Info taken from: https://stackoverflow.com/questions/12370326/decompile-an-apk-modify-it-and-then-recompile-it Info taken from: https://stackoverflow.com/questions/43111057/differences-between-apktool-and-baksmali

[!NOTE] When searching for APK decompilation and recompilation, you will stumble upon two different tools. One of them is baksmali, which is only for decompiling the DEX files inside the APK. DEX files contain only the code of the app. The other tool is called apktool. This tool is capable of unpacking and repacking APK files, including resource files, binary files, etc. apktool can also decompile and recompile the DEX files to and back from smali, by using baksmali under the hood. Although you can use baksmali directly, it is more work than apktoolt, so our tool of choice will be apktool.

Install apktool: https://apktool.org/docs/install

When you have your APK file ready, you can start to generate the editable smali code from the APK by executing:

apktool d some_app.apk

This will produce a folder with the same name as the APK, where all the app content and decompiled smali code resides in.

Note: If you get an out of memory error (Exception in thread "main" java.lang.OutOfMemoryError: Java heap space), you have to increase the JAVA_HEAP_SIZE. Info taken from: https://stackoverflow.com/questions/880855/increase-the-java-heap-size-permanently To tell Java it should use a maximum memory of 16GB, execute:

export _JAVA_OPTIONS="-Xmx16g"

Then execute apktool again and see if it works. The needed maximum memory apparently depends on the size of the APK to be decompiled.

Setting up Environment (IDE) for smali code

To efficiently work with smali code, I recommend using Visual Studio Code or VSCodium with a few extensions installed. It is possible to use any other text editor, but it is generally harder to find relevant spots in the code because there is usually no smali syntax highlighting and advanced navigation support available.

Install either Visual Studio Code or VSCodium on your machine:

  • https://code.visualstudio.com/
  • https://vscodium.com/

Install the following extensions:

  • APKLab (to be able to follow references, go to the definition of a symbol, etc.): https://github.com/APKLab/APKLab
  • smalise (for syntax highlighting): https://github.com/LoyieKing/Smalise
  • ASD (for debugging on a real or virtual Android device using the generated smali code): https://github.com/Chaos1323/ASD

Open the smali code folder and check if the extensions work correctly:

  1. In Visual Studio Code, open the folder which was created by apktool before (the one named like the APK)
  2. Open any smali file (under smali or smali_classesX)
  3. Check if the code syntax is shown in color (smalise should take care of that)
  4. By right-clicking on some code, you can select "Find all References", which is a really important tool, especially if the codebase is large or obfuscated

Set up smali Debugger

To be able to debug a running instance of the app using the smali code in Visual Studio Code, we have to set up the configuration for ASD first.

Inside Visual Studio Code, Go to Run -> Add configuration to create a new launch.json file. Fill the contents with the following template:

{
    "version": "0.2.0",
    "configurations": [
        {
            "type": "ASD",
            "request": "launch",
            "name": "Smali Launch",
            "packageName": "com.company.someapp",
            "mainActivity": "com.company.someapp.MainActivity",
            "deviceId": "12345678",
            "workDir": "${workspaceFolder}"
        }
    ]
}

Now you have to fill some information about the app and the device.

For the device id you need to turn on and connect your device first. You also have to enable USB or Wireless debugging on the device itself in the developer settings, so your computer can access the device. Allow the connection to your computer if asked on the device.

  1. Make sure the device is plugged in via a data USB cable. A cable that is only designed to charge your device will NOT work. If you cannot use a cable, you can use the wireless debugging option.
  2. On the device, go to Settings and find the software information. These menus are different for each device manufacturer, so search on the web how you can get there on your particular device.
  3. Find the Build number setting and repeatedly tap many times on it to unlock the developer options. On work devices, this setting could be disabled by your IT for security reasons.
  4. Once the developer options are unlocked, locate them and enable "USB Debugging". If you cannot or don't want to use a USB cable, you can instead turn on the "Wireless debugging" option
  5. If you are going to use the wireless debugging option, you have to connect the computer and your Android device to the same WiFi.
  6. Make sure you have the android debug bridge adb installed. If not, install it: https://developer.android.com/tools/adb
  7. Execute adb devices to list all connected devices. You have to select to correct one if multiple devices are present.
  8. Make sure adb lists your device as device and not as unauthorized. If it lists unauthorized you have to manually allow the debug connection on the device.
  9. Copy and paste the correct device ID from the adb devices command to the deviceId in the launchSettings.json in Visual Studio Code
  10. To find the package name of the app, execute adb shell to enter the device via a shell environment and then execute either pm list packages -f to list all installed packages or if your want to search for a specifiy string inside the package name: pm list packages -f | grep someapp. Use exit to close the shell environment to the device.
  11. Add the package name to the packageName field in the launchSettings.json
    • In the AndroidManifest.xml of your app code you will find a node starting with <application.
    • If you found it, copy the name from the android:name attribute.
    • For the following example <application android:name="com.company.someapp" ...> the app name would be com.company.someapp.
    • Paste this name into the packageName.
  12. The mainActivity field in the launchSettings.json file needs to be filled with the name of the MainActivity of the app to be debugged. You can find this in the AndroidManifest.xml when you search for android:targetActivity and take the name from the attribute android:targetActivity of the <activity-alias node or if there is no such alias node and you have an <activity, take itsandroid:name. value. Which one you need depends on the app.

[!NOTE] By pressing F5 while in Visual Studio Code, you should be able to launch an installed app and attach the debugger to it. Since we didn't create and install our repackaged app yet on the device, it is not going to work at the moment with the error code Failed to continue: launch the application failed. Your setup itself should be complete now and you can continue this guide.

Understanding smali

We are now ready to start analyzing, understanding and modifying our app.

But wait! Even though smali code is considered human readable, it is not as trivial to understand as high languages like Kotlin or Java. Smali is representation of the underlying bytecode, which is run by the Android Runtime (ART). This code uses system calls on a lower level and deals with some constructs that are not present in higher languages. This means that the smali code of an app is generally more verbose than its Kotlin or Java equivalent.

These few things are of help to understand the basics of smali code:

  • Cheat sheet for Dalvik opcodes (official): https://source.android.com/docs/core/runtime/dalvik-bytecode
  • Cheat sheet for Dalvik opcodes (unofficial, may be outdated): http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html
  • Cheat sheet for Smali (unofficial): https://gist.github.com/AadilGillani/8c5690ebbaceda2914f9dc37197bd154
  • Smali uses registers instead of variables. They are called v0, v1, etc. or for parameters p0, p1, etc. See this page for details: https://github.com/JesusFreke/smali/wiki/Registers
  • These are the most common data types in smali code:
    • V - Void - can only be used for return types
    • Z - Boolean (logical)
    • B - Byte (byte)
    • S - Short
    • C - Char
    • I - Integer
    • J - Long (64 bits)
    • F - Float (floating)
    • D - Double (64 bits)
  • To understand how types, methods and fields work together, check out the following page: https://github.com/JesusFreke/smali/wiki/TypesMethodsAndFields

If you need to patch a specific thing in the app, several strategies can be useful to find what you need:

  • Try to find strings that are shown in the app. These strings are often stored in a resource XML File, which has a named identifier and a numeric ID attached to it. Search all files (Ctrl+Shift+F) for these two identifiers to find references to it.
  • Use the "Get all References" or "Go to Definition" functions if you need to traverse the code. While doing that, try to understand the relation of classes, methods, fields and their purpose

Deobfuscation

Although smali code can be understood by humans, it is a tedious process to understand the inner workings of an app using only the smali representation of the app. For this instance it is possible to get an even more human-readable version of the app code through further decompilation. The following tools can be used to generate a java representation of the source code. Keep in mind that this code CANNOT be converted back to smali code or even a working APK:

  • jadx / jadx-gui https://github.com/skylot/jadx (produces a good but not perfect output)
  • https://www.decompiler.com/ (produces a good but not perfect output)
  • http://apk-deguard.com/ (only works for really small APKs)

AI Deobfuscation / Navigation

With the help of AI we can get a better understanding of the obfuscated smali code.

There are many different options for AI tools available. A few ones are presented here that are free and generally do a great job at searching and explaining a smali codebase.

These tools can be installed in Visual Studio Code or other IDEs.

Codeium

Codeium is an AI assistant which can be configured to have the whole codebase in its context. This makes it a powerful tool to search for methods, strings, etc. in an obfuscated and complex codebase.

Codeium Setup

  1. Install Codeium in Visual Studio Code from: (https://codeium.com/)
  2. Open extension settings
  3. Set Search Max Workspace File Count to 0. This will unlock the "unlimited" context
  4. Set Enable Search to true. This enables the model to access the whole codebase
  5. Click on Enable Config->Edit in settings.json to open the settings.json file. Verify that the configuration looks like the following:
{
    "codeium.searchMaxWorkspaceFileCount": 0,
    "codeium.enableSearch": true,
    "codeium.enableConfig": {
        "*": true,
        "smali": true
    }
}

Codeium Usage

One possibility is to query a snippet of code:

  1. Select a method, whole file or something specific
  2. Right click -> Codeium: Explain selected code block
  3. CodiumAI will explain to you what the selected code does Note, that Codeium is not that great to explain things in detail. Using CodiumAI for this use case will bring better results.

Another possibility is to ask a question where to find or explain certain things in the codebase:

  1. Open Codeium icon in the left pane
  2. Enter a prompt about the codebase. Here are a few examples of what is currently possible:
    • Give a summary over the AndroidManifest.xml present in the codebase
    • From which company is this app?
    • What is the intent of this app?
    • How is the app structured?
    • Where is the entrypoint of the app?
    • This app has the purpose of doing xy. Where in the code does xy happen?
    • Where in the code is xy?
    • Give a hypothetical call stack of how the xy method would be called
    • What purpose has xy.smali? What is a better name for it?
    • What external dependencies does this code have? Provide a full list
    • Where in the code is the user login? And to which API does it authenticate against?
    • What are the files for in smali/androidx/xy?

CodiumAI / Codiumate

CodiumAI is more specialized into exlaining snippets of code. It really shines when marking a method or a whole file and asking it to explain what is happening in there. It generally can give a more detailed explanation of which values are used and why.

CodiumAI / Codiumate Setup

Install CodiumAI in Visual Studio Code from: (https://www.codium.ai/)

No further setup is required.

CodiumAI / Codiumate Usage

One possibility is to query a snippet of code:

  1. Select a method, whole file or something specific
  2. Right click -> Codiumate -> Explain this code
  3. CodiumAI will explain to you what the selected code does
  4. You can click on Continue this chat to ask further questions. Some useful prompts you can give it are:
    • What is a better name for this method?
    • From where is this code called from?
    • Explain all registers in this method
    • On which line is variable xy defined?
  5. Make sure to check the References and find the actual file or snippet used to find the given information

Output values to debug log in Smali code

A good option to get output from an app is by planting additional debug logs into the app. We have to find a good location for that first, for example after a method returns a value.

The following snippet defines writes a String to the debug log, which then can be observed with logcat:

# Define a custom log tag
const-string v8, "some-tag"

# Convert an Integer type to String
invoke-static {v1}, Ljava/lang/String;->valueOf(I)Ljava/lang/String;
move-result-object v9

# Invoke Log.d(logTag, message) / Debug Log
invoke-static {v8, v9}, Landroid/util/Log;->d(Ljava/lang/String;Ljava/lang/String;)I

[!NOTE] Notice that v8 and v9 have to be valid registers inside the current method. For example, if a method return should be logged, a value incremented by one from the method return value should work.

Reassemble APK from smali code

When you are done with your modifications or if you just want to be able to debug the application, you can generate the new (unsigned) APK using:

apktool b [folder name] -o some_app_modified.apk

This APK cannot be installed yet. You need to sign it first in the next step.

Sign APK

Info taken from: https://github.com/patrickfav/uber-apk-signer

To be able to install the APK on an actual Android device, it needs to be signed. We can use the default debug keys to do that using Uber Apk Signer. Download the Uber Apk Signer JAR file from https://github.com/patrickfav/uber-apk-signer/releases/latest and place it next to the unsigned APK file.

With the following command you can now automatically sign the APK with the default debug keys:

java -jar uber-apk-signer.jar --apks /path/to/apks

The output will be of the format some_app-aligned-debugSigned.apk and it can be installed on an Android device.

With the command adb install some_app-aligned-debugSigned.apk you can install the APK directly on the device without bringing the APK package to the Android device over detours.

Launch app via adb

To start an app on a device connected with adb:

adb shell am start -n <packageName>/<packageName>.<activityName>

The packageName and the activityName are needed to start an app through adb on Android. You can check the debugging setup instructions earlier how to get to these values.

Example for starting an app on a device though adb:

adb shell am start -n com.company.some/com.company.some.MainActivity

Looking at Android device logs with logcat

When an Android device is connected through USB or WiFi debugging, it is possible to get the log stream from the attached computer.

To get ALL logs (including system logs):

adb logcat

This will probably flood your screen with unnecessary messages, so we can filter this a little more.

To filter only for logs of exactly one level (in this example Debug):

adb logcat | grep " D "

To filter only for logs above a certain level (in this example Debug):

adb logcat *:D

The Log levels are:

  • Debug: V
  • Debug: D
  • Debug: I
  • Debug: W
  • Debug: E

To filter for app logs (exclude system logs)

adb logcat | grep "app="

To filter for only a specific app, use:

adb logcat | grep "app=com.company.someapp"

Note, that com.company.someapp is the app name which is also defined in the AndroidManifest.xml file

As an example we can also combine these filters and get all Errors from our app:

adb logcat | grep "app=com.company.someapp" | grep " E "

Debugging smali code

Taken from: https://stackoverflow.com/questions/20879950/how-to-debug-smali-code-of-an-android-application

To be able to debug the app you first have to install the signed APK on the device. You also need to follow the instructions in Set up smali Debugger to setup the ASD extension.

When trying to use the F5 key to debug the app, there can be several issues. Make sure you followed the setup instructions earlier so you have your packageName, mainActivity and deviceId set correctly.

Issues with debuggable flag: In the AndroidManifest.xml, try to add android:debuggable="true" to the <application node. For example: <application android:debuggable="true" ...>. This will enable the debug mode for this app. Make sure to remove this flag again if you want to release a patched version of the app.

Some people reported that if the app defines a custom process name which is conflicting with another app on the device, the app cannot be debugged. In that case, open theAndroidManifest.xml and remove the the process name android:process=":SomeProcess" from the <application node and try if it works now. Make sure to also remove the process name from the startup script in Visual Studio Code. Be sure to re-add the process name again when you want to release a patched version of the app. Changing the process name to a non-conflicting one should also work.

Law situation

Your own apps

For apps for which you are the owner of, you are allowed to do whatever you want with it. You can reverse engineer, make modifications, sell modified versions of the app, etc.

If you work for an organization, the organization must give you permission to reverse engineer their app to stay in legal area. Typically the following contacts can be asked:

  • Copyright owner, the organization itself (Official contact forms on imprint pages should lead to the correct people)
  • Intellectual Property (IP) department, if the organization is large
  • Individual Developer or Developer Team, if it is an open-source app without a big organization behind it
  • Licensing department, if the app is licensed under a specific license (e.g. MIT, GPL, etc.)

Third party apps

More complex are the laws about apps from third parties.

[!WARN] The following list is incomplete and may be wrong. Consult a lawyer to be sure about the actual current laws in place.

EU and US laws are more or less the same, but nuances are different.

  • It is generally allowed to reverse engineer third party apps for the following reasons only:
    • Interopability: To achieve interopability between different systems or products
      • Reverse engineering for the sake of interopability has to be done by a person who has a legitimate interest in the interopability of the app.
    • Error correction / Debugging: To correct errors (bugs) in the app
    • Security research: To identify vulnerabilities and developing security patches
  • It is generally NOT allowed to:
    • Add new features to an existing app without asking for permission from the owner
    • Create a competing product with the knowledge gained from a reverse engineered app without asking for permission from the owner
    • Infringing intellectual property rights of the owner of the original app

The US has more strict laws concerning circumvention of TPMs (Technological Protection Measures). Circumventing these is generally forbidden with a few exceptions.

TPMs include:

  • Encryption
  • DRM (Digital Rights Management)
  • Digital Watermarking
  • Fingerprinting
  • Access Control
  • Copy Protection
  • Obfuscation
  • Software Protection Dongles
  • etc.

It is generally a good idea to check the app's terms of service and/or license agreement for a clause that says that reverse engineering is prohibited or not.

It is definitely a gray area to create a modified version of an app not owned by you without asking for permission. Always make sure to ask for an official written permission from the copyright holder, then it should be a safe situation.

Further references on the law topic:

  • US law (DMCA Act): https://www.law.cornell.edu/uscode/text/17/103
  • German book about the law situation in the US and EU: https://books.google.de/books?id=oGV3xhSEztIC