ida调试安卓手机手机apk

f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb shell
shell@android:/ $ su
su
root@android:/ # cd /data/local/tmp
cd /data/local/tmp
root@android:/data/local/tmp # ll
ll
-rwxr-xr-x root     root            0 2015-12-17 11:15 KinguserV4.6.2B233.apk
-rw-rw-rw- shell    shell        2581 2015-12-10 16:57 TavEngineScan.jar
-rw-rw-rw- shell    shell       22747 2015-12-18 14:13 UiAutomator.jar
-rw-rw-rw- shell    shell        1308 2015-12-02 09:37 Wesecure.jar
-rwxrwxrwx shell    shell      506668 2016-01-25 14:45 aapt
-rwxrwxrwx shell    shell       13716 2016-01-25 14:45 box
drwxrwxrwx shell    shell             2013-01-01 08:54 chenwwang
-rwxrwxrwx shell    shell          36 2015-08-28 14:36 chenwwang.config
drwxrwxrwx shell    shell             2016-01-22 14:15 dalvik-cache
-rw-rw-rw- shell    shell      684187 2016-01-22 09:18 microservice.jar
-rw-rw-rw- shell    shell    13110344 2015-11-06 00:47 mq_1446742060.apk
-rw-rw-rw- shell    shell     7735473 2015-11-12 14:32 mq_1447309953.apk
-rwxrwxrwx shell    shell        8708 2016-01-25 14:45 mtools
-rw------- shell    shell        5388 2015-12-18 14:06 uidump.xml
drwxrwxrwx root     root              2016-02-18 16:52 zgo


f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb pu
sh E:\Tools\Analysis\IDA-pro-plus-6.5-x86-arm1.7\dbgsrv\aa_server /data/local/tmp   将ida的android_server改名后 push到安卓手机中
3982 KB/s (566944 bytes in 0.139s)


f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb shell
shell@android:/ $ su
su
root@android:/ # cd /data/local/tmp
cd /data/local/tmp
root@android:/data/local/tmp # ll
ll
-rwxr-xr-x root     root            0 2015-12-17 11:15 KinguserV4.6.2B233.apk
-rw-rw-rw- shell    shell        2581 2015-12-10 16:57 TavEngineScan.jar
-rw-rw-rw- shell    shell       22747 2015-12-18 14:13 UiAutomator.jar
-rw-rw-rw- shell    shell        1308 2015-12-02 09:37 Wesecure.jar
-rw-rw-rw- shell    shell      566944 2014-01-16 20:28 aa_server
-rwxrwxrwx shell    shell      506668 2016-01-25 14:45 aapt
-rwxrwxrwx shell    shell       13716 2016-01-25 14:45 box
drwxrwxrwx shell    shell             2013-01-01 08:54 chenwwang
-rwxrwxrwx shell    shell          36 2015-08-28 14:36 chenwwang.config
drwxrwxrwx shell    shell             2016-01-22 14:15 dalvik-cache
-rw-rw-rw- shell    shell      684187 2016-01-22 09:18 microservice.jar
-rw-rw-rw- shell    shell    13110344 2015-11-06 00:47 mq_1446742060.apk
-rw-rw-rw- shell    shell     7735473 2015-11-12 14:32 mq_1447309953.apk
-rwxrwxrwx shell    shell        8708 2016-01-25 14:45 mtools
-rw------- shell    shell        5388 2015-12-18 14:06 uidump.xml
drwxrwxrwx root     root              2016-02-18 16:52 zgo
root@android:/data/local/tmp # chmod 777 aa_server
chmod 777 aa_server
root@android:/data/local/tmp # ./aa_server
./aa_server
IDA Android 32-bit remote debug server(ST) v1.17. Hex-Rays (c) 2004-2013
Listening on port #23946...






再开一个cmd


f:\Samples\安卓相关\安卓模拟器\...\sdk\platform-tools>adb forward tcp:23946 tcp:23946




打开ida,debugger-attach-remote armlinux/android debugger
hostname输入127.0.0.1


fgdfg










开启调试模式后用adb devices命令无法获取mx4设备


问题已经解决:
    
根据 flyme 的文档: K:\MX4 USB Reference Manual\简体\MX4_ADB_参考说明书.txt


操作如下:


二、Windows XP中文环境
1.  建立或修改C:\Documents and Settings\<你的用户名>\.android\adb_usb.ini文件,在该文件中添加一行文本,内容是0x2a45。


2.  检查ADB设备是否找到(命令行程序中)
    adb kill-server
    adb devices
  
三、Windows 7中文环境
1.  建立或修改C:\用户\<你的用户名>\.android\adb_usb.ini文件,在该文件中添加一行文本,内容是0x2a45。


2.  检查ADB设备是否找到(命令行程序中)
    adb kill-server
    adb devices
   

你可能感兴趣的:(ida调试安卓手机手机apk)