Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Java2Exe Unpacking Tutorial
#1
Some time ago, I did some research on a tool called Java2Exe which converts jar files to an executable and obfuscates or encrypts the file names to deter reverse engineering. In this blog post, I show how to recover the jar archive at all 3 protection levels. I hope you enjoy.

http://reverseengineeringtips.blogspot.c...g-jar.html
Reply
#2
Interesting article, thanks for sharing it :-)

Do you know any popular applications that use java2Exe?
[Image: 7rL6Nl0.png]
Reply
#3
I do not know of any popular programs that use it. Someone sent me what I think was a game bot that used this program to protect its source code. I just followed the steps like I wrote in the tutorial to unpack it. Alas, I don't recall what the program's name was, because I lost it in a hard drive failure. To date, it is the only wild sample I've found.
Reply
#4
Very interesting way to do this! Another way to do it is dump the JVM's loaded classes (Because unlike JET http://www.excelsiorjet.com/ it requires an external JVM).

Great job on this however, it's awesome to see people reversing the program itself.
Reply
 


Forum Jump:


Users browsing this thread: 1 Guest(s)

About The Bytecode Club

We're a community focused on Reverse Engineering, we try to target Java/Android but we also include other langauges/platforms. We pride ourselves in supporting and free and open sourced applications.

Website