f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb shell
shell@android:/ $ su
su
root@android:/ # cd /data/local/tmp
cd /data/local/tmp
root@android:/data/local/tmp # ll
ll
-rwxr-xr-x root root 0 2015-12-17 11:15 KinguserV4.6.2B233.apk
-rw-rw-rw- shell shell 2581 2015-12-10 16:57 TavEngineScan.jar
-rw-rw-rw- shell shell 22747 2015-12-18 14:13 UiAutomator.jar
-rw-rw-rw- shell shell 1308 2015-12-02 09:37 Wesecure.jar
-rwxrwxrwx shell shell 506668 2016-01-25 14:45 aapt
-rwxrwxrwx shell shell 13716 2016-01-25 14:45 box
drwxrwxrwx shell shell 2013-01-01 08:54 chenwwang
-rwxrwxrwx shell shell 36 2015-08-28 14:36 chenwwang.config
drwxrwxrwx shell shell 2016-01-22 14:15 dalvik-cache
-rw-rw-rw- shell shell 684187 2016-01-22 09:18 microservice.jar
-rw-rw-rw- shell shell 13110344 2015-11-06 00:47 mq_1446742060.apk
-rw-rw-rw- shell shell 7735473 2015-11-12 14:32 mq_1447309953.apk
-rwxrwxrwx shell shell 8708 2016-01-25 14:45 mtools
-rw------- shell shell 5388 2015-12-18 14:06 uidump.xml
drwxrwxrwx root root 2016-02-18 16:52 zgo
f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb pu
sh E:\Tools\Analysis\IDA-pro-plus-6.5-x86-arm1.7\dbgsrv\aa_server /data/local/tmp 将ida的android_server改名后 push到安卓手机中
3982 KB/s (566944 bytes in 0.139s)
f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb shell
shell@android:/ $ su
su
root@android:/ # cd /data/local/tmp
cd /data/local/tmp
root@android:/data/local/tmp # ll
ll
-rwxr-xr-x root root 0 2015-12-17 11:15 KinguserV4.6.2B233.apk
-rw-rw-rw- shell shell 2581 2015-12-10 16:57 TavEngineScan.jar
-rw-rw-rw- shell shell 22747 2015-12-18 14:13 UiAutomator.jar
-rw-rw-rw- shell shell 1308 2015-12-02 09:37 Wesecure.jar
-rw-rw-rw- shell shell 566944 2014-01-16 20:28 aa_server
-rwxrwxrwx shell shell 506668 2016-01-25 14:45 aapt
-rwxrwxrwx shell shell 13716 2016-01-25 14:45 box
drwxrwxrwx shell shell 2013-01-01 08:54 chenwwang
-rwxrwxrwx shell shell 36 2015-08-28 14:36 chenwwang.config
drwxrwxrwx shell shell 2016-01-22 14:15 dalvik-cache
-rw-rw-rw- shell shell 684187 2016-01-22 09:18 microservice.jar
-rw-rw-rw- shell shell 13110344 2015-11-06 00:47 mq_1446742060.apk
-rw-rw-rw- shell shell 7735473 2015-11-12 14:32 mq_1447309953.apk
-rwxrwxrwx shell shell 8708 2016-01-25 14:45 mtools
-rw------- shell shell 5388 2015-12-18 14:06 uidump.xml
drwxrwxrwx root root 2016-02-18 16:52 zgo
root@android:/data/local/tmp # chmod 777 aa_server
chmod 777 aa_server
root@android:/data/local/tmp # ./aa_server
./aa_server
IDA Android 32-bit remote debug server(ST) v1.17. Hex-Rays (c) 2004-2013
Listening on port #23946...
再开一个cmd
f:\Samples\安卓相关\安卓模拟器\...\sdk\platform-tools>adb forward tcp:23946 tcp:23946
打开ida,debugger-attach-remote armlinux/android debugger
hostname输入127.0.0.1
fgdfg
开启调试模式后用adb devices命令无法获取mx4设备
问题已经解决:
根据 flyme 的文档: K:\MX4 USB Reference Manual\简体\MX4_ADB_参考说明书.txt
操作如下:
二、Windows XP中文环境
1. 建立或修改C:\Documents and Settings\<你的用户名>\.android\adb_usb.ini文件,在该文件中添加一行文本,内容是0x2a45。
2. 检查ADB设备是否找到(命令行程序中)
adb kill-server
adb devices
三、Windows 7中文环境
1. 建立或修改C:\用户\<你的用户名>\.android\adb_usb.ini文件,在该文件中添加一行文本,内容是0x2a45。
2. 检查ADB设备是否找到(命令行程序中)
adb kill-server
adb devices
shell@android:/ $ su
su
root@android:/ # cd /data/local/tmp
cd /data/local/tmp
root@android:/data/local/tmp # ll
ll
-rwxr-xr-x root root 0 2015-12-17 11:15 KinguserV4.6.2B233.apk
-rw-rw-rw- shell shell 2581 2015-12-10 16:57 TavEngineScan.jar
-rw-rw-rw- shell shell 22747 2015-12-18 14:13 UiAutomator.jar
-rw-rw-rw- shell shell 1308 2015-12-02 09:37 Wesecure.jar
-rwxrwxrwx shell shell 506668 2016-01-25 14:45 aapt
-rwxrwxrwx shell shell 13716 2016-01-25 14:45 box
drwxrwxrwx shell shell 2013-01-01 08:54 chenwwang
-rwxrwxrwx shell shell 36 2015-08-28 14:36 chenwwang.config
drwxrwxrwx shell shell 2016-01-22 14:15 dalvik-cache
-rw-rw-rw- shell shell 684187 2016-01-22 09:18 microservice.jar
-rw-rw-rw- shell shell 13110344 2015-11-06 00:47 mq_1446742060.apk
-rw-rw-rw- shell shell 7735473 2015-11-12 14:32 mq_1447309953.apk
-rwxrwxrwx shell shell 8708 2016-01-25 14:45 mtools
-rw------- shell shell 5388 2015-12-18 14:06 uidump.xml
drwxrwxrwx root root 2016-02-18 16:52 zgo
f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb pu
sh E:\Tools\Analysis\IDA-pro-plus-6.5-x86-arm1.7\dbgsrv\aa_server /data/local/tmp 将ida的android_server改名后 push到安卓手机中
3982 KB/s (566944 bytes in 0.139s)
f:\Samples\安卓相关\安卓模拟器\adt-bundle-windows-x86-20130917.467161976\adt-bundle-windows-x86-20130917\sdk\platform-tools>adb shell
shell@android:/ $ su
su
root@android:/ # cd /data/local/tmp
cd /data/local/tmp
root@android:/data/local/tmp # ll
ll
-rwxr-xr-x root root 0 2015-12-17 11:15 KinguserV4.6.2B233.apk
-rw-rw-rw- shell shell 2581 2015-12-10 16:57 TavEngineScan.jar
-rw-rw-rw- shell shell 22747 2015-12-18 14:13 UiAutomator.jar
-rw-rw-rw- shell shell 1308 2015-12-02 09:37 Wesecure.jar
-rw-rw-rw- shell shell 566944 2014-01-16 20:28 aa_server
-rwxrwxrwx shell shell 506668 2016-01-25 14:45 aapt
-rwxrwxrwx shell shell 13716 2016-01-25 14:45 box
drwxrwxrwx shell shell 2013-01-01 08:54 chenwwang
-rwxrwxrwx shell shell 36 2015-08-28 14:36 chenwwang.config
drwxrwxrwx shell shell 2016-01-22 14:15 dalvik-cache
-rw-rw-rw- shell shell 684187 2016-01-22 09:18 microservice.jar
-rw-rw-rw- shell shell 13110344 2015-11-06 00:47 mq_1446742060.apk
-rw-rw-rw- shell shell 7735473 2015-11-12 14:32 mq_1447309953.apk
-rwxrwxrwx shell shell 8708 2016-01-25 14:45 mtools
-rw------- shell shell 5388 2015-12-18 14:06 uidump.xml
drwxrwxrwx root root 2016-02-18 16:52 zgo
root@android:/data/local/tmp # chmod 777 aa_server
chmod 777 aa_server
root@android:/data/local/tmp # ./aa_server
./aa_server
IDA Android 32-bit remote debug server(ST) v1.17. Hex-Rays (c) 2004-2013
Listening on port #23946...
再开一个cmd
f:\Samples\安卓相关\安卓模拟器\...\sdk\platform-tools>adb forward tcp:23946 tcp:23946
打开ida,debugger-attach-remote armlinux/android debugger
hostname输入127.0.0.1
fgdfg
开启调试模式后用adb devices命令无法获取mx4设备
问题已经解决:
根据 flyme 的文档: K:\MX4 USB Reference Manual\简体\MX4_ADB_参考说明书.txt
操作如下:
二、Windows XP中文环境
1. 建立或修改C:\Documents and Settings\<你的用户名>\.android\adb_usb.ini文件,在该文件中添加一行文本,内容是0x2a45。
2. 检查ADB设备是否找到(命令行程序中)
adb kill-server
adb devices
三、Windows 7中文环境
1. 建立或修改C:\用户\<你的用户名>\.android\adb_usb.ini文件,在该文件中添加一行文本,内容是0x2a45。
2. 检查ADB设备是否找到(命令行程序中)
adb kill-server
adb devices
本文介绍如何通过IDA Pro进行Android应用的远程调试过程,包括配置环境、推送调试服务器到设备及建立调试连接等步骤。
1099

被折叠的 条评论
为什么被折叠?



