From ae0f060b030167e5f3e407a791857f545a7f13e7 Mon Sep 17 00:00:00 2001 From: whx Date: Wed, 14 Dec 2022 19:30:46 +0100 Subject: [PATCH] bump --- Forensics/Android.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/Forensics/Android.md b/Forensics/Android.md index d32db1c..52e681a 100644 --- a/Forensics/Android.md +++ b/Forensics/Android.md @@ -6,3 +6,15 @@ ```sh ( printf "\x1f\x8b\x08\x00\x00\x00\x00\x00" ; tail -c +25 backup.ab ) | tar xfvz ``` + +## Android React + +A React Native app may be extracted and searched by +```sh +cp com.example.apk example-apk.zip +unzip -qq example-apk.zip -d ReactNative +cd ReactNative +find . -print | grep -i ".bundle$" +``` +and pretty print the Javascript in the browser +This is taken from [Hacktricks' How-To](https://book.hacktricks.xyz/mobile-pentesting/android-app-pentesting/react-native-application)