开发者

What's more difficult to reverse engineering: Application or jar containing Applet?

What's more difficult to reverse engineering: Application or jar containing Applet?

I know it's easy to reach the source code of a java application but is that possible for a

jar containing applet like this one in this html?

<HTML>
<HEAD>
</HEAD>
<BODY>
<H3><HR WIDTH="100%">Applet HTML Page<HR WIDTH="100%"></H3>
<P>
<applet code = 'poster' 
archive = 'poster开发者_C百科.jar', 
width = 100%, 
height = 700/>
</P>
<HR WIDTH="100%">
</BODY>
</HTML>


There is no difference, you can download poster.jar, by pointing your browser to the URL of the web page, without the final file name and adding poster.jar to it.

Alternatively, you can use firebug, go in the Net view, find poster.jar, right click on it and choose "Copy Location", then paste it in a new tab.

Once downloaded you can examine it.


In the end, an applet referencing a jar file will download that jar, furthermore, the jar in the applet will be public, so it will be possible to download it by pointing at its URL.

If you want to difficult reverse-engineering of your java packages, you can always use bytecode obfuscation. There are several tools out there (i.e. ProGuard).


The relative "difficulty" doesn't depend on what is the underlying application (in the case of Java, of course) but whether some sort of code obfuscation technique was applied.


I know it's easy to reach the source code of a java application

No it isn't, unless you post it on the Internet.

If you are referring to JAR files, all JAR files can be decompiled, although you can make it harder via obfuscation. Application or applet makes no difference to that.

0

上一篇:

下一篇:

精彩评论

暂无评论...
验证码 换一张
取 消

最新问答

问答排行榜