Create your account

Already have an account? Login here

Note: By joining, you will receive periodic emails from Coursetro. You can unsubscribe from these emails.

Create account

107. Proguard And Reverse Engineering Your APK file

Design + Code an Android App from Scratch

Woah, wait a second..

Scrounge up some loose change to become a pro member, or login to your account to view this lesson.

Alright, join now. Or login to your account if you're already a pro member.

This video shows you how to reverse engineer our APK file and then protect the source code using Proguard which is an obfuscation tool provided by Android. In the first step, download In the first step, download dex2jar which is a tool that takes our APK file and converts that into a jar file. In the next step, use jd-gui to reverse engineer the JAR file to reveal the source code. The source code is easily readable and modifiable by any person at this point. We use a tool called Proguard that shrinks, optimises, and obfuscates code by removing unused code and renaming classes, fields and methods with semantically obscure names. The result is a a smaller sized .apk file that is more difficult to reverse engineer. Pro guard runs only when you build your application in release mode, so you don’t have to deal with obfuscated code when you build your application in debug mode.

Course Cirriculum