Reverse Engineering Mobile Phone Elite Software to Desktop Computer: Tinder

This is the default teaser text option. You can remove or edit this text under your "General Settings" tab. This can also be overwritten on a page by page basis.

Reverse Engineering Mobile Phone Elite Software to Desktop Computer: Tinder

0

Reverse Engineering Mobile Phone Elite Software to Desktop Computer: Tinder

Brief Outline

1 Reverse manufacturing Cellular phone unique software to pc: Tinder Honours Project for Carleton college Samuel Pra.

Explanation

Reverse Engineering Cellphone unique Application to pc: Tinder Honours work for Carleton University Samuel Prashker – 100755635 Supervised by: Dr. Dwight Deugo class of desktop research Carleton University Ottawa, Canada

Abstract lots of software present on smartphones work with that system for their comfort, simplicity, and portability. However, some of those programs have no any functionality that relies upon the mobile program itself. Tinder, as an example, a mobile matchmaking app, was created and programmed for sole function of running on Android and iPhone, limiting entry to those only ecosystems. From a security point of view and as a proof of concept in supporting the argument against mobile unique software, the Android os form of Tinder has become reverse engineered to work on a normal desktop computer through a Universal windowpanes program software, dubbed: Tindows.

Acknowledgments I wish to thank my friends who generously contributed her mobile phones during start methods associated with job. With out them i’d not have had the opportunity to start out the extended and hard process of community sniffing and reverse manufacturing. I would like to thank Curtis Schouten for providing their windowpanes 10 Tablet for examination of common program codebase on a genuine mobile device. I would personally also will particularly give thanks to by name Patrick Cuerrier and Issa-Albert Kane getting genuine people that were prepared to give their reports during the development with the software. Without their own realworld data, a lot of insects wouldn’t normally have been identified.

Desk of articles 1. Introduction . 5

Back Ground . 9 2.1.

Representational state transfer . 11

Safe Sockets Coating (SSL) . 11

Setting-up Android to Proxy site visitors through a Remote Computer . 13

Circumventing Encrypted SSL website traffic with a Man-In-The-Middle Attack . 14

Recording the Login Process for Tinder . 16

Recording the API Phone Calls of Criterion Tinder Task. 18

Tinder’s Change Cycle . 21

Preliminary Step of Porting – generating a Tinder clients Library in C#. 23

Common windowpanes program and obtaining the myspace OAuth Token . 25

XAML and Facts Binding . 28

Tindows – The “SuperficialPage” . 29

Tindows – The “ConversationPage” . 31

Tindows – Alerts . 33

Listings and recognition. 35 4.1.

Validating the TinderAPI . 35

Validating the consumer software and software Enjoy . 36

Summation. 39 5.1.

Potential Jobs . 40

6. Records . 42 7. Appendix . 43

1. Introduction 1.1.

Using the increase in smartphone practices and interest in cellular software ecosystems restricted to mobile systems (Bing Play shop, fruit application shop, Microsoft Store), software with practical or convenient uses on old-fashioned networks such as Desktops are left within the particles getting disregarded. Apps are only developed for exclusive cellular usage. There is absolutely no pc webpage being offered, but quite simply an internet site . to promote the smartphone software. This plan of exclusivity can limit consumers’ selection when choosing which programs to acquire, which devices to own and which ecosystems to tie on their own to. Exercise tracking and calorie counting programs tend to be a good example of a challenge definitely fixed platformindependent. Eg, MyFitnessPal supplies all potential avenues to make use of their unique program: Android, new iphone 4, house windows cell, and a completely highlighted websites providing similar efficiency on cellular applications. Many solutions that begun prior to the introduction of smartphones need properly ported their own approaches to mobile systems (ex: PayPal, e-bay, Amazon, Gmail, etc.). The difficulty is based on programs and businesses that https://besthookupwebsites.org/spanking-sites/ spawn solely with a focus regarding mobile industry. One particular issue is Tinder: a dating program for Android and iphone 3gs only. Despite online-dating becoming a traditionally program agnostic issue, Tinder sadly confines their people to two programs. What if the consumer switches to a Windows telephone? Let’s say a user won’t have a cell phone and would want to get access to it on the Mac computer or windowpanes maker? There isn’t any functionality made available from Tinder that as a necessity needs a mobile system. As a result, i’ll be attempting to resolve this by identifying the client-server buildings of Tinder and porting it to a Desktop clients that communicates with Tinder’s machines.

The desire behind building a desktop computer program are destroyed into some travel power. Primarily, since culmination of my 4 ages within a pc and Web safety focused stream, a project that demonstrates those honed abilities was a worthy cause to pursue. In identifying how Tinder communicates to the computers, from a security standpoint, there will probably probably end up being lots of obstacles to overcome, security measures to combat and information to spoof. Most likely the consumer produced will need to “act” like a mobile device. The elegance for the safety in position will establish the issue in achieving this. Second, as someone who will not take into account the Desktop program to-be a dying marketplace, Im directly pushed to make sure their emergency. Although this job is only an educational proof-of-concept that it can be achieved, the content to remove is you can manage, and this ought to be done. Solutions created for the mobile system needs to have just as obtainable desktop computer countertop areas (offered the program cannot rely on non-traditional desktop computer gear like video camera, GPS, flash light). Third, this really is a project which will require using the services of technology which were glanced over during my studies. In determining the traffic getting delivered on top of the wire, you will find several resources including Wireshark that may need to be discovered and put on this job. Also, if there’s usability the software works regarding tool, you are able a de-compilation associated with the program is necessary (regarding Android os it could indicate de-assembling the application form to “smali” style, things I have never ever accomplished but have always been pushed to educate yourself on).

The original intent would be to figure out all methods of telecommunications Tinder really does to do its software function, like (yet not simply for) how exactly does Tinder talk and authenticate to fb, how do they speak and authenticate to their very own hosts, as well as how would they obfuscate or encrypt or otherwise protect her telecommunications channel. Those things done around the 6

Leave a Reply

    No Twitter Messages.