

I decided to have a fresh start at the problem and figure out if I even need to go as far as decompiling the APK.

It only took 3 years, a whole lot of learning, and a renewed interest in reverse-engineering for me to come back to this project. I eventually decided to put the project on the back burner and come back to it once I had more time and experience. I tried reverse-engineering the app but couldn’t get far. Simple, innocent questions that led me into a rabbit hole. Was the processing happening on the phone?.I had a lot of questions about how the app worked under the hood: I tried the app and it worked! It only required a one time purchase fee and that was it. I had recently learned that I could use a certain app to get step-by-step solutions to my problems.

I was in high school and was preparing for my advanced maths exam. You might be wondering what fueled this curiosity so let me explain. It should give you a fairly good idea of how APK reverse engineering generally works. In this post, I will show you how I was able to reverse engineer an Android app, add some debug statements, and figure out how certain query parameters for API calls were being generated. This had to be changed but it took a long time for that to happen. There were people out there who knew how to navigate and modify the internals of an APK file and I wasn’t one of them. I had always wanted to learn how to reverse engineer Android apps. Let's Reverse Engineer an Android App! June 22, 2020
