Android Question jRDC Security

alyami

Member
Licensed User
When decompile APK file it was very easy to find jRDC server address and all SQL command name,

How can we secure this not to be disclosed?
 

alyami

Member
Licensed User
I think you misunderstand me, I am talking about the APK file for Android, if a hacker get the APK file for jRDC App, he can easily decompile it then get all information needed to access data on server the way he likes.

this website decompile APK of your releases App, then produce all Java files of your source code where you can find everything


you will get 2 folders:
resouces
soureces

your code will be at source\"Package name"
sources\b4a\"your app name"

b4xmainpage.java is where most of your code in, text format

try it
 
Upvote 0

aeric

Expert
Licensed User
Longtime User
The point is let say Bob extract your APK, he get the server URL and the names of the command. The command eg. "sql.LoginUser" does not provide the actual SQL command, as the actual command is stored at the server. If he is a registered user, of course he can execute the command and get back a result to let him access as his access. He is still unable to do other things what he not suppose to do. You can use encryption, restrict by user access control or roles, return a short live token or whatsoever to make it harder if you are concern. Bob doesn't have full access to the database such as Delete a table or updating other user's data. The queries or available commands must be very limited.
 
Upvote 0

knutf

Active Member
Licensed User
Longtime User
Based on Erel's original thread about jRDC2, it is not easy for me to understand how authentication on the server side should be done. Can someone please show an example. It is nice if the example is based on Erel's example.
 
Upvote 0
Top