1 00:00:01,150 --> 00:00:06,250 Now let's discuss the tools and techniques used for hacking Android devices, so the first tool is the 2 00:00:06,700 --> 00:00:12,670 tool, and this tool can be used for application, reverse engineering and for creating malware by infecting 3 00:00:12,670 --> 00:00:13,690 legitimate apps. 4 00:00:13,960 --> 00:00:18,070 Now you can download the latest version of the AP from this website. 5 00:00:18,280 --> 00:00:20,680 Now, let's go ahead and launch the epic tool. 6 00:00:20,680 --> 00:00:24,970 And for this type epic, it will come and hit enter here. 7 00:00:24,970 --> 00:00:27,520 You will see all the available options to be used. 8 00:00:27,550 --> 00:00:35,470 OK, so you see things like forcing delete destination directly storing framework files into a specific 9 00:00:35,470 --> 00:00:41,570 directory, just showing the person printing some advanced information about the tool and many more. 10 00:00:42,040 --> 00:00:45,740 I am not teaching you all of these options, but let's see an example. 11 00:00:46,060 --> 00:00:51,310 So here I have a simple application or a simple file that I call the example. 12 00:00:52,030 --> 00:00:59,200 And let's disassemble it by using the IT command space and then the name of the file here you can see 13 00:00:59,200 --> 00:01:04,620 the tool disassembly in the AP file and also decoding the Android manifest. 14 00:01:04,780 --> 00:01:10,320 So that's actually the XML file that has all the different information about the actual package itself. 15 00:01:10,690 --> 00:01:15,280 And you also see decoding all the different files within the application package as well. 16 00:01:15,790 --> 00:01:20,400 Now, the tool created the directly called example, which is the same name of the app. 17 00:01:20,410 --> 00:01:25,690 If I let it go into the directory and then here you can actually see the different files that it actually 18 00:01:25,690 --> 00:01:29,350 disassembled, as well as the Android manifest that I mentioned earlier. 19 00:01:29,560 --> 00:01:34,960 Now you can even see the user permissions of the application and you can even add, delete or modify 20 00:01:34,960 --> 00:01:37,800 the permissions that the new impersonality application. 21 00:01:38,200 --> 00:01:43,930 I know it's a simple example, but it's up to you to be creative and change the application as you want. 22 00:01:44,470 --> 00:01:48,610 Now, let's talk about the two other tools that are often used for reverse engineering. 23 00:01:49,000 --> 00:01:55,600 One is called the excluder and the other one is called Geddie GUI, basically a graphical unit interface. 24 00:01:55,750 --> 00:01:58,180 Now, let's see what it's actually next to. 25 00:01:58,180 --> 00:02:04,770 That is basically it is a tool that converts the text files in BUJAR files and next is very good. 26 00:02:04,810 --> 00:02:10,600 And it is actually a Java compiler that can be compiling your files to the original Java source. 27 00:02:10,900 --> 00:02:15,400 OK, so you do this for reverse engineering and compiling applications. 28 00:02:15,400 --> 00:02:15,790 Right? 29 00:02:16,120 --> 00:02:20,410 And you can download both of the tools from the links that you are seeing on your screen. 30 00:02:20,770 --> 00:02:24,820 No installation is actually required for these tools because they are executables. 31 00:02:25,180 --> 00:02:27,100 And again, you can just download them. 32 00:02:27,100 --> 00:02:31,000 And in a stable operating system, you can launch and use these applications.