UnCrackable-Level1

UnCrackable-Level1

安卓逆向

image-20230523224709120

jadx打开

image-20230523224815607

这里进行了校验

利用apktool进行修改后重打包

将这段删掉

image-20230523225055736

1
java -jar apktool.jar d UnCrackable-Level1.apk
1
java -jar apktool.jar b UnCrackable-Level1

然后再进行签名

首先生成自己的密钥

1
keytool -genkey -alias demo.keystore -keyalg RSA -validity 40000 -keystore demo.keystore

签名

1
jarsigner -verbose -keystore demo.keystore UnCrackable-Level1.apk demo.keystore

再安装,成功进入

image-20230523225236883

找到校验函数

image-20230523230937139

发现是AES+Base64

image-20230523230957620

image-20230523231010576

image-20230523231049489

I want to believe

frida HOOK

image-20230602215239366

hook onClick函数使得点OK不退出

1
2
3
4
5
6
7
console.log("Script loaded successfully ");
Java.perform(function () {
var f = Java.use("sg.vantagepoint.uncrackable1.MainActivity$1");
f.onClick.implementation = function(arg1, arg2) {
console.log("HOOK!");
};
});
1
frida -UF -l .\script.js

image-20230602215400404

成功进入

image-20230602215546699