Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Understanding the Anti-Tampering of APK
Hello guys,

I'm looking to extract the API calls of an obfuscated apk. It seems like the app was obfuscated with DexGuard, since there is one .class fragment which is called ProtectedGame.class.

The app communicates over X.509 SSL with certificate pinning, therefore all I need to do is to modify the methods checkServerTrusted() and checkClientTrusted(). But as soon as I edit something in the .smali the App crashes immediately after reinstalling. Even if I just sign the .apk with a new generated key, the app crashes. It seems that there are some anti-tampering methods involved that check the signature of the app. I tried to modify the obfuscated methods in the .smali but hadn't got any success. I also tried running some xposed modules on Android 4.x that claim to counter certificate pinning.

Can you help me with this? I am talking about this app:

I will include the compiled, ProtectedGame.smali and the original .apk to this post.

Thank you!

The files:

Forum Jump:

Users browsing this thread: 1 Guest(s)

About The Bytecode Club

We're a community focused on Reverse Engineering, we try to target Java/Android but we also include other langauges/platforms. We pride ourselves in supporting and free and open sourced applications.