Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deobfuscation - able to identify the strings #30

Closed
harikatam opened this issue Mar 10, 2020 · 1 comment
Closed

Deobfuscation - able to identify the strings #30

harikatam opened this issue Mar 10, 2020 · 1 comment

Comments

@harikatam
Copy link

Step 1 reverse engineering.
step 2 Go to class file and get the string line Example - public static String eduScreenExpDate = Deobfuscator$app$Release.getString(6436);
Step 3 - Go to Deobfuscator$app$Release class file
Deobfuscator$app$Release.java

Add this line in java file and run - System.out.println("Value"+Deobfuscator$app$Release.getString(6377));
We are able to get values.
See we can add any proguard not to display this file

@MichaelRocks
Copy link
Owner

Hi @harikatam,

It's definitely possible to get deobfuscated strings if you patch application's bytecode. You should obfuscate the application with ProGuard/R8 to make it harder to deobfuscate.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants