Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
obligatory introduction
#1
Hi, new to decompilation. Looking to reverse engineer the API for my national railway ticket booking android app (IRCTC Connect) since their client has major missing features. The app has a lot of protections (SSL Pinning, obfuscation, JWT encryption) and right now I'm trying to figure out how the JWT encryption works. Digging through .smali files is quite hard for me, and the jadx decompilation seems to be incorrect for a lot of function calls. Would like to know how to go about debugging .smali files and inserting debug statements (eg. breakpoints?). Thanks
Reply
 


Forum Jump:


Users browsing this thread: 1 Guest(s)



About The Bytecode Club

We're a community focused on Reverse Engineering, we try to target Java/Android but we also include other langauges/platforms. We pride ourselves in supporting and free and open sourced applications.

Website