What's more difficult to reverse engineering: Application or jar containing Applet?
What's more difficult to reverse engineering: Application or jar containing Applet?
I know it's easy to reach the source code of a java application but is that possible for a
jar containing applet like this one in this html?
<HTML>
<HEAD>
</HEAD>
<BODY>
<H3><HR WIDTH="100%">Applet HTML Page<HR WIDTH="100%"></H3>
<P>
<applet code = 'poster'
archive = 'poster开发者_C百科.jar',
width = 100%,
height = 700/>
</P>
<HR WIDTH="100%">
</BODY>
</HTML>
There is no difference, you can download poster.jar, by pointing your browser to the URL of the web page, without the final file name and adding poster.jar to it.
Alternatively, you can use firebug, go in the Net view, find poster.jar, right click on it and choose "Copy Location", then paste it in a new tab.
Once downloaded you can examine it.
In the end, an applet referencing a jar file will download that jar, furthermore, the jar in the applet will be public, so it will be possible to download it by pointing at its URL.
If you want to difficult reverse-engineering of your java packages, you can always use bytecode obfuscation. There are several tools out there (i.e. ProGuard).
The relative "difficulty" doesn't depend on what is the underlying application (in the case of Java, of course) but whether some sort of code obfuscation technique was applied.
I know it's easy to reach the source code of a java application
No it isn't, unless you post it on the Internet.
If you are referring to JAR files, all JAR files can be decompiled, although you can make it harder via obfuscation. Application or applet makes no difference to that.
精彩评论