TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reverse Engineering the Subway Android App

39 pointsby rwestergrenalmost 10 years ago

5 comments

jtwebmanalmost 10 years ago
The security measures are not there to secure you from seeing the requests, they are there to stop people using the app getting hacked with man in the middle attacks, no? I think they know they need to also make sure their API is secure as well.
评论 #9865169 未加载
mmastracalmost 10 years ago
&gt; but I’m not quite sure of the reasoning behind the root checking process<p>I&#x27;m surprised the author didn&#x27;t pick up on the class&#x2F;package names: a quick Googling of &quot;Paydiant&quot; shows that this is likely all a result of a third-party loyalty&#x2F;payment integration they&#x27;ve used: <a href="http:&#x2F;&#x2F;www.paydiant.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.paydiant.com&#x2F;</a>
评论 #9864166 未加载
vixsomnisalmost 10 years ago
Would proguard be able to prevent (or at least make much more difficult) this kind of reverse engineering?
vizzahalmost 10 years ago
what is a good dalvic decompiler at the moment? are you using smali&#x2F;baksmali for re-compilation?
kennydudealmost 10 years ago
The endpoints look a lot nicer than what the UK app uses (which is just some Java enterprise thing)