Recently There became a need to get into one of my old email that I had not logged into in 2 years. I did have a kindle fire hdx then and after getting into that I found that the password was stored on the device but it was encrypted. So for the last week I have been trying various tool to help me reverse engineer the app decrypt method. I have very little java programing experience and no prior experience with android code. So I am asking for help with this process. I have very little free time which has made learning how to reverse engine android app properly impossible. What I have learned so far is that the function is stored in com.amazon.pim.util and that the only dependency's for the EncryptUtil is the core.odex and framework.odex. within the method it involves PBEWithMD5AndDES and base 64 in external calls, I can decode the base 64 on my own it is the rest of it that I cant get to decode. I had multiple account in the email app and all of the encrypted passwords had the same start. If anyone wants to test their progress I will make a test account and send you the encrypted password and tell you if you do get the correct password. I wont give you the encrypted version of my password and email but I may give you the encrypted password by itself for testing.
Technically if I bought Amazon as a company I could get them to accomplish this but I dont believe that's spirit of rule 6 so I cant buy this. If you want links to the relevant files pm me and remember I may take up to 24-48 hours to respond.
My Kindle Has not been updated in 2 years and is closest to the 3.2.5 Fire os. There is source code for that version available from amazon.
Technically if I bought Amazon as a company I could get them to accomplish this but I dont believe that's spirit of rule 6 so I cant buy this. If you want links to the relevant files pm me and remember I may take up to 24-48 hours to respond.
My Kindle Has not been updated in 2 years and is closest to the 3.2.5 Fire os. There is source code for that version available from amazon.
from xda-developers http://ift.tt/1Y3FgGh
via IFTTT
Aucun commentaire:
Enregistrer un commentaire