/r/ReverseEngineering's Weekly Questions Thread
2020-10-17 01:10:28 Author: www.reddit.com(查看原文) 阅读量:322 收藏

Very broad question from a newbie here.

I recently purchased a pair of led glasses to mess around with / use for cosplay etc. The instructions had a QR code that pointed me to here. The only option for android was to download the apk and install it without using the playstore (REDFLAG).

So I scanned the apk (riskware) and installed it on an old burner phone. I've been using the hcl snoop logs to capture some of the BLE packets and I've been using "nRF connect" to send some of the captured bytes with success.

I've managed to capture all of the "Show preset x" commands which are completely different from each other. The problem comes when I use the draw feature (you draw on the screen and it shows up on the glasses) or the write text feature (writes text on the glasses). I've captured packets of this but nothing jumps out to me as to how the bytes relate to the pixels on the glasses.

I started watching some videos and reading blogs on other people doing the same thing with various devices and most people when they hit a brick wall decompile the app that comes with it. I've never decompiled an android app before but with some research it was easy enough to figure out.

I used JADX to decompile the apk only to discover shared object .so files. Which led me down the path of researching android packers. It seems like the app has been packed with jiagu (contains libjiagu.so) or qihoo (contains com.qihoo).

My question is what is the best way to unpack this application? and does it seem like I'm on the right track to reverse enginnering the connection between these glasses and the app?


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/jcbhm8/rreverseengineerings_weekly_questions_thread/
如有侵权请联系:admin#unsafe.sh