Skip to content

Instantly share code, notes, and snippets.

View richyk1's full-sized avatar
💭
Studying

koolkid richyk1

💭
Studying
View GitHub Profile
@richyk1
richyk1 / gist:4909d6c16a44894c82fa2ba3faf44432
Created November 30, 2018 18:19
Decompiling and reversing SL.apk
This gist is assuming that the user who reads this has knowledge of aligning & signing their modified APK's whilst also the ability of writing & reading .smali code.
To succesfully modify price & duration of bought tickets you have to complete two essential steps.
Upon analysing this apk I found out that it does not have any anti tamper, which made decompiling in .smali much easier.
After decompiling the apk file into .smali you will be presented with the smali folder
Upon starting, the application requests all the dynamic information from their server.
Using jadx-gui and opening classes.dex com.sl.SlBilijetter.Backend.ServerCommunication class makes calls to:
* /sl-appserver/services/appversion/getappversion
* /sl-appserver/services/generateUserToken
# Your init script
#
# Atom will evaluate this file each time a new window is opened. It is run
# after packages are loaded/activated and after the previous editor state
# has been restored.
#
# An example hack to log to the console when each text editor is saved.
#
# atom.workspace.observeTextEditors (editor) ->
# editor.onDidSave ->