Android逆向之 内存脱壳 内存dumpso

一  .内存dumpso文件 分析

idc脚本:


static main(void)

{

auto fp, dexAddress, end, size;

dexAddress = 0xA644C008;

size = 0x0086CAB0;

end = dexAddress + size;

fp = fopen("D:\\classes.dex", "wb");

for ( ; dexAddress < end; dexAddress++ )

fputc(Byte(dexAddress), fp);

}

二. 脱so文件脚本:


static main(void)

{

auto fp, dexAddress, end, size;

dexAddress = 0xA644C008;

size = 0x0086CAB0;

end = dexAddress + size;

fp = fopen("D:\\xxx.so", "wb");

for ( ; dexAddress < end; dexAddress++ )

fputc(Byte(dexAddress), fp);

}

三 .ida操作教程:

adb push d:\as /data/local/tmp/as

adb shell

su  获取root权限

chmod 777 给文件777权限

cd data/local/tmp 进入这个目录

./as    启动android_server 我这边改名为as

再开一个cmd窗口

adb forward tcp:23946 tcp:23946  默认23946端口转发

adb forward tcp:15923 tcp:15923  -p修改端口转发

adb shell am start -D -n com.example.protectapp/org.isclab.shh.protectapp.MainActivity 调式模式启动

jdb -connect com.sun.jdi.SocketAttach:hostname=127.0.0.1,port=8614  jdb恢复程序运行

5.1下断点位置: dvmdexfileparse  libdvmso: dvmDexFileOpenPartial  libart.so: Openmemory

教程链接:https://pan.baidu.com/s/1JBm7AnPqMv4WgRJPHOHGQg

提取码:viqu

你可能感兴趣的:(Android逆向之 内存脱壳 内存dumpso)