Reverse Engineer an APK in KALI

Reverse Engineer an APK in KALI

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial guides viewers through the process of decompiling a Trojan-signed APK file. It begins with opening a terminal and using the Apeak tool to decompile the APK and review its permissions. The tutorial then demonstrates how to use the D2J tool to convert the APK into a JAR file, which contains Java files. Finally, it shows how to use JD GUI to view these Java files in a human-readable format.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in decompiling a Trojan signed APK file?

Using JD-GUI to view Java classes

Opening the terminal and navigating to the desktop

Converting the APK to a JAR file

Performing a permissions review

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file is crucial for reviewing permissions in a decompiled APK?

classes.dex

AndroidManifest.xml

resources.arsc

META-INF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the 'dex2jar' tool in the APK analysis process?

To decompile the APK into a folder

To view the AndroidManifest.xml

To convert the APK into a JAR file

To compile Java code into APK

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to view Java classes in a human-readable format after converting an APK to a JAR?

apktool

JD-GUI

Android Studio

dex2jar

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What file extension indicates that the APK has been successfully converted to a format viewable by JD-GUI?

.dex

.apk

.jar

.xml