Skip to content

This script helps you in cracking the logic of an existing APK.

Notifications You must be signed in to change notification settings

hung0125/APK-Method-Tracker

Repository files navigation

APK-Method-Tracker

Upcoming task

  • Support CharSequence (useful for UI setText)

Installation

TBC

Guidelines & Tips

TBC

How It Works

op1 op2

Use Case

Step 1

Open the modified app. Do something in the app.

Step 2

Check the log folder
image
Each file's name has the following meaning: [{The class name}]--{method name}({parameter}){method type (e.g., Z = boolean, V = void}
In the newer version, a nanotime is added in front of the name above to identify the execution sequence.

Step 3

Investigate the decompiled and translated code
image
Make use of "search in content"
Rule: if there is a logger20200108() call, the method is under the detection, vice versa.
ALTERNATIVELY, analyzer.py is provided for easier code investigation

Suggested test plan

Case: You sure the entry point equals the first activity that the app starts

1st test:
Depth = 1 scan <== apps you think are complicated, so the bulky info won't scare you
Depth = 2 scan <== apps you think are simple, so you'll less likely to miss key info

2nd test if not satisfied with previous:
Depth = 2 scan <== apps you think are complicated
Depth = 3 scan <== apps you think are simple

Max depth is not suggested, the app might crash. It also makes the trace harder to understand.

Case: You are not sure...

Depth = -1 (full scan)

Prequisites

Make sure the app has the right to write the external storage. Suggested to add permission then compile once before using this script.

About

This script helps you in cracking the logic of an existing APK.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published