Question

I have a task from my lecturer to do some reverse engineering. After doing some tutorials, I can reverse engineer basic APK file (with no proguard/dexguard).

My task is finished, but I'm getting curious now. I tried to search this on Google but nothing good/useful was found.

Is it possible to reverse engineering an APK with proguard and how to do it?

Edit (dont know why people are voting to close this question, so this is what i've done so far) :

I can reverse engineered a proguarded apk, but the variables are changed (which made my head hurts) :

  TextView I;
  EditText J;
  EditText K;
  EditText L;
  CheckBox M; 

Can someone help me so i can perfectly reverse engineered it?

No correct solution

OTHER TIPS

it's possibile and obviously more difficult.

If it's your own .apk, or you have access to the project, then you can use the proguard mapping located here:

<project_root>/bin/proguard/mapping.txt

otherwise it's just more difficult and you'll need to get used to read and unserstand a lot of guarded bytecode. Defenetly not easy but possible if you, for instance, have an old version of the apk not guarded.

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top