Friday, March 30, 2012

, ,

Resize java apps easily on ur phone[s60v3/5]

STEPS:
1. Download JAVAKILLER
2. Click 'Permission'
Tut1.jpg 
3. Select the java app you want to resize
Tut2.jpg 
4. Set ORIGINAL SIZE of the app
Tut3.jpg 
5. Set the DESIRED/TARGET SIZE.
Tut4.jpg 
Tut5.jpg 
6. Wait till the process ends.
Tut6.jpg 
11-1-2011 16:46:04 Upload
Download(1.93 KB)

Enjoy your game/app!


Java Killer 1.5 EN by Rebel@POPDA.sis.html
, , ,

LCG X-plore v1.57 S60v3v5^3 Anna Belle UnSigned

X-plore is a file manager for mobile phones, with wide range offunctions on the device's file system.
*View all drives / folders / files on phone in tree view
* Integrated text and image viewer
* View file details
* Edit file attriutes (hidder, read-only, etc)* Rename and delete files
* Create or edit text files
* Create folders
* Multi-selection
* Copy or move files and folders
* Send files by Bluetooth or Infrared
* Extract files from Zip, Rar, Jararchives
* Pack files to Zip archive
* View Word documents
* Hardware device info
* View processes and tasks
* Built-in program update
* Viewing, saving files in Messagning folders
* Hex viewer and editor
* Search files
* Folder hotkeys
- Crack Full 2 Icon by MTOi. Thanks
- Mod Icon Belle&Atlantics
- install one .sis file only
- Need hackphone


Cracked




Thursday, March 29, 2012

,

[Tutorial]How to Install CyanogenMod 7 Gingerbread

Generally speaking, flashing a custom ROM onto your phone is a fairly simple, straight-forward process -- once it's rooted and a custom recovery image installed. 



With CyanogenMod 7 (CM7) there's a little more to it. 

First and foremost, CyanogenMod 7 isn't fully cooked yet. It's functional enough to be my daily driver, but it's still in the RC0 phase (meaning it's not ready to be called a "release candidate"). In fact, at the time of this writing there are only 3 "nightly" builds available (though this will have likely increased by the time you read this post). 

Following any instructions beyond this point is at your own risk and could render your phone a useless brick. You've been warned. 

Next, this article assumes that you have permaRooted your smartphone and are familiar with installing custom recovery images and ROMs. If you're not, we have plenty of articles to get you up-to-speed. 

Also, this tutorial should apply to the following devices: 
- Ace (Desire HD) 
- Crespo (Nexus S) 
- Glacier (MyTouch 4G) 
- Vision (G2 & Desire Z) 

For the purposes of this article I have personally (and somewhat painfully) gone through the following on my T-Mobile G2 (HTC Vision), so the files linked to below are specific to that device. If you're using another device head over to forum.cyanogenmod.com and find the corresponding files to match your hardware. 

Ready for some fun? Okay, let's go! 

0. Backup 

The first step of installing any ROM is to backup what you already have. By doing so you ensure that if something goes wrong all you have to do is wipe/factory reset and restore, and all you've lost is some time. 

The easiest way I've found to backup is with ROM Manager premium. Launch the app and tap "Backup Current ROM". Follow the prompts, wait for the backup to complete, and you're golden. On to the next step. 

1. Download the Files to Your SDCARD 

Again, these files are specific to the HTC Vision (G2/Desire Z). If you're using a different phone you'll want to find the equivalent files for your device. 

For this ROM you're going to need two files, and one optional file: 
ClockworkMod Recovery 3.x (rename this file to recovery.img to make the next steps easier) 
CyanogenMod ROM 7 
Google Apps ("gapps") 

Place them all on the root of your sdcard. 

2. Flash the Recovery Image 

Open your app drawer and find your terminal emulator (mine's called Terminal, if you don't have one, you can grab one from the Market). 

Once in Terminal type su (enter), approve superuser access if prompted. 

Next, type flash_image recovery /sdcard/recovery.img (enter). 

This should replace your old recovery image with the new one. Why do we need a new one? Apparently Gingerbread makes use of the EXT4 file system and previous recovery images do not support it. This new version supports both old and new, so even if you decide to go back, you don't need to flash back you old recovery image. 

NOTE: If you were previously using ClockworkMod Recovery, the text was green. In the new version the text is orange. 

3. Factory Reset/Wipe 

Since this is a big change, you'll need to wipe so you can start from a clean slate. To do so, open ROM Manager again and select the option to "Reboot into Recovery". 

Once in Recovery, select the option to "wipe data/factory reset", follow the prompts. 

4. Install CyanogenMod 7 

Once wiping is complete, select "install zip from sdcard", "choose zip from sdcard", then select the CM7 Nightly that you previously downloaded. Follow the prompts.

5. Install Gapps 

Once flashing CM7 Nightly is complete, select "install zip from sdcard", "choose zip from sdcard", then select the Google Apps package that you previously downloaded. Follow the prompts. 

Select the option to "reboot system now" and wait patiently as CM7 boots for the first time (remember, first boots take significantly longer than subsequent boots). 

6. Setup and Backup 

Once booted, get everything setup the way you want, go back into ROM Manager, and snap another backup. 
,

[Tutorial]Boot From USB Drive

Here's a short Tutorial on How to BOOT from USB Drives...


1> Insert Your USB Drive before You Start Your Computer..


2>Now, Open Your Computer's BIOS Setting..


(NOTE : To Open Your BIOS Settings, a key need to be pressed, mainly Del/F2 Key Or other FUNCTION Key, according to your motherboard)


3>Go to BOOT Options, Turn BOOT From Other Devices ON, there You Should See Your USB Drive in the list (If You don't, Save Changes & Restart Your Computer)..


4>Now, Select Your USB Drive in the BOOT Priority Device list in the First & You are DONE..


Don't Forget to SAVE Your Settings..


Now You Can See The Message "Press any key to Boot....."



Installation of OS via USB :


Now, its simple...
First copy/paste all the files of OS that You want to install to Your USB Drive and then do the above steps (You can Skip Softwares)...

when you get to see the message "Press any key to BOOT...."
all the other processes are same as other devices like CD/DVD..

HOW TO RUN SYMBIAN APPLICATIONS ON PC

Follow these steps to run a Symbian application on your computer.

1. Download Symbian SDK from HERE


2. Install the SDK and all chaintools included in the package in their default location.
3. After all packages are installed, reboot your PC.
4.Now goto Start » Program files » Nokia Developer Tools » Symbian SDK » Emulator to launch the emulator
5. Wait for the Emulator to completely load. The Emulator program will look like this when finished loading.



6.Now inside the Emulator program, gotoFile » Openand then choose your favorite Symbian applications that you want to run.



7. All set, install and enjoy your favorite Symbian apps on your PC. If you get error while installing unsigned applications, gotoMenu » Settings » Application settingsand change value from Signed only to all.



NOTE: THE SYMBIAN SDK ARE HBIG FILES. IF YOU WANT TO DOWNLOAD SDK YOU SHUD NEED A NOKIA DEVELOPER ACCONT.

FOR: S60 3rd Edition, Feature Pack 1.
S60 3rd Edition.
S60 2nd Edition, Feature Pack 2 (formerly 2.2).
S60 2nd Edition, Feature Pack 1 (formerly 2.1).
S60 2nd Edition (formerly 2.0).
S60 1st Edition, Feature Pack 1 (formerly 1.2).
S60 1st Edition (formerly 0.9).

GO HERE
,

TUTORIAL (RUN JAVA BROWSER ON ANDROID)


As we know java browsers are still widely used, some of us even have used it for years, for example: Opera Mini, Bolt, UC Browser, and many more.
The problem is to use a java browser on the phone andorid that we have. Hem … if you have uses kemulator on the PC, then on the phone you must use jbed android emulator.
Jbed emulator is an application that allows you to run Java applications on an android phone. The way it works is very simple and I am sure you all can use it.
1)Install jbed. There are two separate version for Android2.1 and 2.2
2)Open and install the application.You will see icon of jbed u will see screen as in attachment 1
3)3.Run Jbed Emulator you can see a new window. Now you need search SD card to find java application. You can do it bytouch “SD Card”. Remember, berfore you install this application you must have java browser on your SD.See attachment 2
4)4.You will see this application searching on you android. And get some java application. Choose a browser, on example i run opera mini 6.0. Press OK if this confirmation has show.See attachment 3
5)5.Here you can see opera mini 6.0 run like on Java phone.See attachment 4. And all other browser which run on java.
untitled.JPG


untitled.GIF

untitled.GIF

untitled.GIF

AIRTEL NEW PROXY 700+SPEED





Use this in firefox.
proxy : 176.31.222.34
port : 80
homepage : fb.me

airtel 3g wb trick 200 + speedddd 26 march 2012


proxy =112.25.12.36

port = 80

-----------------------------------------------------------------------------

airtel resume support proxy .... Working
Here is Trick.
apn-airtelgprs.com
proxy-66.135.50.150
port-80
HP-http://59.160.229.40/proxy/
----------------------------------------------------------------------------------

Super fast proxy for Airtel Updated 
Proxy : enoughschool.com
port : 80
home page: fb.me

uper fast proxy for your browsers and IDM TESTED!!!(UPDATED)
-----------------------------------------------------------------------------------------
Use 80 port in each proxy 

217.172.179.88
85.132.78.38
67.205.67.45
77.79.8.223
165.193.102.220
85.113.155.3
204.93.211.219
216.118.70.12
87.117.135.86
89.135.63.36
89.188.136.116
89.106.13.93
212.17.131.120
77.50.220.69
107.20.198.227
121.52.71.23
87.255.6.117
141.105.65.70
85.113.155.3
202.59.80.158
212.88.157.205
109.69.7.146
89.135.63.36
202.59.80.158
165.193.102.220
202.59.80.158
89.188.136.116

Wednesday, March 28, 2012

,

How To Crack Android Application & Game

How To Crack Android Application & Game
Setting up the Ground :
Well, it seems people are getting crazy about Android platform(everyone is trying to buy an Android phone!). lets see if I can get my hands dirty with this Linux java clean room engineered platform.
To begin our journey we need Android SDK, a target to test with and the necessary tools.
You can download the necessary file from these locations:
Android SDK: http://developer.Android.com/sdk/index.html

Deurus Android crackme 03: http://crackmes.de/users/deurus/android_crackme03/

Smali and baksmali: http://code.google.com/p/smali/

Dex2jar: http://code.google.com/p/dex2jar/

Java decompiler: http://java.decompiler.free.fr/

Download and install Android SDK, SDK platform(latest is 2.2 at the time of writing), necessary Java packages and rest of the tools. Create a virtual device from SDK menu and start emulation. Within few minutes you can see the emulator booting up and showing the phone screen. Well, thats it! we have our emulator up and running.

Getting Started with the Game :

Now we need to install the software(crackme, its legal!) to the emulator. For that you may have to get acquainted with Android debug bridge(adb). Installing a apk file is pretty simple, all you have to do is to run two commands from Android SDK directory/tools.

After the installation you can see the crackme icon from application menu.

Now run the crackme by clicking on it. If everything went as expected you will see the crackme application on the screen.

Now we will play with it, pressing check button with no inputs pops a message 'Min 4 chars', and with a proper name it pops up 'Bad boy'. We have to remember these strings because we will be using them as our search keys when we disassemble the apk(actually dex) files. Also note that we have two hardware ids and we need to find out what those exactly means.
Real Android Reversing :
As our crackme is up and running in emulator, we now move onto reversing it. If you have read apk file format, you can visualize it as a extended JAR file which essentially is a zip file.Now you can change the crackme file name from Crackme03.apk to Crackme03.zip and decompress it to any folder.

Now the interesting file for us is classes.dex, which contains the compiled vm codes. We are going to disassemble the dex file with baksmali. Commands are pretty simple as you can see from screen shots.

If everything worked fine, we will have a folder structure similar to Java packages. Interesting .smali files are located at'\com\example\helloandroid'. Open all the .smali files into your favorite text editor(I use Notepad  ). If you have never done anything related to reverse engineering/esoteric programming/assembly(IL) programming, you will probably think: !. Relax. We have just opened a disassembled dex file. Now, if you are thinking how on earth someone can find the correct location of checking function, I hope you remember those pop up strings I told earlier. Yeah, 'Min 4 chars' and 'Bad boy'. Now we will use those strings as our search keys. Searching �Min 4 chars� in all the opened .smali files, we will find a hit in HelloAndroid$2.smali line 130.

Our aim is to understand the serial checking function and write a keygen for it. For that we have to know all the dalvik opcodes that are used here. You can visit this page to understand the opcodes and after that you can convert disassembled code to much higher language constructs. I will provide a brief code snippet which actually implements the algorithm. Two hardware ids used are IMEI and sim serial number.



01 //Read name from text box
02 const v23, 0x7f050004
03 invoke-virtual/range {v22 .. v23}, Lcom/example/helloandroid/HelloAndroid;->findViewById(I)Landroid/view/View;
04 move-result-object v9
05
06 //Read serial from text box
07 const v23, 0x7f050006
08 invoke-virtual/range {v22 .. v23}, Lcom/example/helloandroid/HelloAndroid;->findViewById(I)Landroid/view/View;
09 move-result-object v21
10
11 //Checking whether the name is of length greate than 4
12 const/16 v22, 0x4
13 move v0, v11
14 move/from16 v1, v22
15 if-ge v0, v1, :cond_51
16
17 //Popup showing Min 4 chars
18 const-string v23, "Min 4 chars"
19 const/16 v24, 0x1
20 .line 86
21 invoke-static/range {v22 .. v24}, Landroid/widget/Toast;->makeText(Landroid/content/Context;Ljava/lang/CharSequence;I)Landroid/widget/Toast;
22 move-result-object v13
23 .line 88
24 .local v13, notificacionToast:Landroid/widget/Toast;
25 invoke-virtual {v13}, Landroid/widget/Toast;->show()V
26
27 //There is a little exception trick to make integer string from username
28 //It converts aaaa to 97979797 which is ascii equivalent
29 invoke-virtual {v10, v5}, Ljava/lang/String;->charAt(I)C
30 move-result v3
31
32 //Getting first 5 chars from ascii converted name
33 const/16 v22, 0x0
34 const/16 v23, 0x5
35 move-object v0, v12
36 move/from16 v1, v22
37 move/from16 v2, v23
38 invoke-virtual {v0, v1, v2}, Ljava/lang/String;->substring(II)Ljava/lang/String;
39
40 //Converting it into integer abd xoring with 0x6B016 - Serial part 1
41 invoke-static {v12}, Ljava/lang/Integer;->parseInt(Ljava/lang/String;)I
42 move-result v22
43 const v23, 0x6b016
44 xor-int v22, v22, v23
45
46 //Getting IMEI from TelephonyManager
47 //http://developer.Android.com/reference/Android/telephony/TelephonyManager.html
48 invoke-virtual {v8}, Landroid/telephony/TelephonyManager;->getDeviceId()Ljava/lang/String;
49 move-result-object v6
50 .line 102
51 .local v6, imei2:Ljava/lang/String;
52
53 //Getting sim serial
54 invoke-virtual {v8}, Landroid/telephony/TelephonyManager;->getSimSerialNumber()Ljava/lang/String;
55 move-result-object v16
56 .line 103
57 .local v16, simsn:Ljava/lang/String;
58
59 //Getting first 6 chars from IMEI, and similarly from sim serial (IMEI.Substring(0,6) will be used as Serial part 3)
60 const/16 v22, 0x0
61 const/16 v23, 0x6
62 move-object v0, v6
63 move/from16 v1, v22
64 move/from16 v2, v23
65 invoke-virtual {v0, v1, v2}, Ljava/lang/String;->substring(II)Ljava/lang/String;
66
67 //Converting them to integer and xoring - Serial part2
68 invoke-static/range {v19 .. v19}, Ljava/lang/Integer;->parseInt(Ljava/lang/String;)I
69 move-result v22
70 invoke-static/range {v20 .. v20}, Ljava/lang/Integer;->parseInt(Ljava/lang/String;)I
71 move-result v23
72 xor-int v22, v22, v23
73
74 //Making a new StringBuilder object and formatting the string to part1-part2-part3
75 new-instance v22, Ljava/lang/StringBuilder;
76 invoke-static {v12}, Ljava/lang/String;->valueOf(Ljava/lang/Object;)Ljava/lang/String;
77 move-result-object v23
78 invoke-direct/range {v22 .. v23}, Ljava/lang/StringBuilder;-><init>(Ljava/lang/String;)V
79 const-string v23, "-"
80 invoke-virtual/range {v22 .. v23}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder;
81 move-result-object v22
82 invoke-static/range {v17 .. v18}, Ljava/lang/String;->valueOf(J)Ljava/lang/String;
83 move-result-object v23
84 invoke-virtual/range {v22 .. v23}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder;
85 move-result-object v22
86 const-string v23, "-"
87 invoke-virtual/range {v22 .. v23}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder;
88 move-result-object v22
89 move-object/from16 v0, v22
90 move-object/from16 v1, v19
91 invoke-virtual {v0, v1}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder;
92 move-result-object v22
93
94 //Checking whether user entered serial and program madeserials are equal.
95 invoke-virtual {v14, v15}, Ljava/lang/String;->equals(Ljava/lang/Object;)


Real Android Reversing :
As our crackme is up and running in emulator, we now move onto reversing it. If you have read apk file format, you can visualize it as a extended JAR file which essentially is a zip file.Now you can change the crackme file name from Crackme03.apk to Crackme03.zip and decompress it to any folder.

Now the interesting file for us is classes.dex, which contains the compiled vm codes. We are going to disassemble the dex file with baksmali. Commands are pretty simple as you can see from screen shots.

If everything worked fine, we will have a folder structure similar to Java packages. Interesting .smali files are located at'\com\example\helloandroid'. Open all the .smali files into your favorite text editor(I use Notepad++). If you have never done anything related to reverse engineering/esoteric programming/assembly(IL) programming, you will probably think: !. Relax. We have just opened a disassembled dex file. Now, if you are thinking how on earth someone can find the correct location of checking function, I hope you remember those pop up strings I told earlier. Yeah, 'Min 4 chars' and 'Bad boy'. Now we will use those strings as our search keys. Searching Min 4 chars in all the opened .smali files, we will find a hit in HelloAndroid$2.smali line 130.

Our aim is to understand the serial checking function and write a keygen for it. For that we have to know all the dalvik opcodes that are used here. You can visit this page to understand the opcodes and after that you can convert disassembled code to much higher language constructs. I will provide a brief code snippet which actually implements the algorithm. Two hardware ids used are IMEI and sim serial number.

As you can see, the algorithm is pretty straight forward. It is using name and two hardware ids as input and doing some operations on them to make a serial. We can easily recode it in any programming language we prefer to make it as a keygen. Anyway, I am not posting any keygen sources as it will spoil the whole phun!

Decoding the Algorithm :

A demonstrative serial calculation routine is given below:

  1. Name: aaaaaHW ID1: 0000000000000000HW ID2: 89014103211118510720
Copy the Code
Here are stepwise instructions on generating final serial number
At first 'aaaaa' will be converted to '9797979797', from whichwe will take first 5 letters and convert it into integer 97979
This will be xored with 0x6B016 resulting 511661 and this will be first part of serial.
For second part, we will take first 6 letters from HW ID1 and HW ID2, convert them to integer and xor, resulting 000000^890141 = 890141.
For third part we will use first 6 characters from HW ID1.
Formatting with the specified delimiter the serial will become '511661-890141-000000'.
Final Verification of Reversing :
Now we will put the same magic number into our Crackme application.


Bingo! everything worked as expected. Now, for all those who thinks it is pretty hard to read all those disassembled instructions and manually converting them to higher language constructs, there are other options. As dalvik is based on design of Java, it is also susceptible to decompilation. There is no decompiler available at this moment, but there is hope.
For now we can use another utility which converts dex files tojar files so that we can use Java decompilers to see much more abstracted code. From starting of this blog post you may have noticed the tool dex2jar. Use dex2jar to convert classes.dex to classes.dex.dex2jar.jar. Open it in a Java decompiler and you can see much better output than dalvik disassembly. Please note that dex2jar is still in development phase and the output is meaningless at many places. This should be used only to get a quick understanding of all the functions.
Conclusion :
In this introductory article, Dhanesh explains reversing Andriod using the emulator and all available tools in sequencewith pictorial elaborative steps. It is mainly based to set up your ground for further reversing work on Andriod Platform.
Well, thats it! We have analyzed an Android program and defeated its protection. Cheerio!
Special How To Crack Gameloft Android HD Games Credit Goes to Djeman for Inventing This Method:
unpack an android package (apk) with a zip extractor, disassemble dex file in smali source files with dex2jar .
delete this {blue} line in the LicenseManagement.smali in the Billing folder.

  1. if-nez v0, :cond_1     .line 224   const-string v0, "ANDROID BILLING"   const-string v0, "THIS IS A FULL VERSION PREVIOUSLY BILLED"   invoke-static {v2, v3, v0}, Lcom/gameloft/android/GAND/GloftRFHP/Billing/GLDebug;->debugMessage(ILjava/lang/String;Ljava/lang/String;)V   .line 225   invoke-static {}, Lcom/gameloft/android/GAND/GloftRFHP/Billing/LicenseManagement;->saveUnlockGame()V   move v0, v2   .line 230   :goto_1   return v0   .line 229    :cond_1     const-string v0, "ANDROID BILLING"   const-string v0, "THIS IS NOT A FULL VERSION!!!!"

So you have to delete the blue line, to avoid the game to jumpto the read line (by deleting this line game will never show THIS IS NOT A FULL VERSION).
rebuild apk After that you need to sign it to run on your mobile.
http://developer.android.com/guide/publishing/app-signing.html
To understand Dalvik's commands more, you'll need that website
http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html
And if you want to go further, for the .so file, the ELF Dynamic library, you have to use IDA Pro to analyze it, and with ARM doc (Find it here) you'll be allowed to modify the file with a hexadecimal editor by calculating the ARM opcodes.
All information is provided for educational purposes only.