Monday, 18 July 2016

reverse engineering tools / decompiler code-coverage



I'm trying to decompile some APK file in order to understand how this app employs certificate pinning.
Since I have proof by testing that it does implement certificate pinning I tried the different decompliler out there (DAD, DEX2JAR, SMALI/BAKSMALI, APKTOOL). I was wondering if those cover the full application code as I couldn't find any of the commonly known classes (hostnameverifier, trustmanager, httpurlconnection...) or even strings (truststore, cert, https, ssl, tls) in the decompiled code.

so if you are aware of any similar issues or even know of ways to hide code from decompilers or have any other comment, please let me know. Any help appreciated.



No comments:

Post a Comment