Hacker News new | past | comments | ask | show | jobs | submit login

Just to clarify a bit more for those who are new to strings and because the audience for the post may learn towards people fresher to reverse engineering:

While most of the time, you're dealing with variables and such in programs, at some point you have to hardcode some information such as URLs to query so something like

BASE_URL = "https://example.com" result = requests.get(BASE_URL + "/api/blah"

If we pretend this is in an Android app which is stored as an apk file (a zip file basically), running strings would spit out "https://example.com" and "/api/blah"

It'll also spit out anything that appears to be an ASCII character so plenty of junk but it's often quite handy as a starting point.

There are, of course, much more precise tools such as man in the middle proxying but that you'll only capture traffic for endpoints actually used by said app. The app may contain other endpoints let unused, rarely triggered and so on.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: