i
History and Features Of Android
Android Application and API Level
Android IDE (Integrated Development Environment)
Authentication (Cryptographic Key Storage, User Authenticators, Biometrics)
Encryption (File Based Encryption, MetaData Encryption, Enabling Adiantum)
GoogleBouncer (SecurityFeatures and Attacks(Delayed & Update) to bypass it)
AndroidManifest.xml (Important File Contents present)
Reverse Engineering
Basic Command
Reverse Engineering is the process of converting the apk file into reusable to perform static analysis of the code or during run time using dynamic analysis or a combination of both.
For this we use tools such as adb, dex2jar, JD-GUI, apktool.
ADB (Android Debugging Bridge) is a versatile command line tool used for installing and debugging of android apps.
Dex2jar is used to convert .dex file into .java jar files.
JD-GUI is used to open up the .jar file.
Apktool is a reverse engineering 3rd party tool to decode resources to original form and then rebuild them after making some modifications.
Don't miss out!