Reverse Engineering Portable Elite Program to Desktop: Tinder

Reverse Engineering Portable Elite Program to Desktop: Tinder

Small Details

1 Reverse Engineering Mobile different Application to pc: Tinder Honours Project for Carleton college Samuel Pra.

Explanation

Reverse Engineering Cellular phone unique software to desktop computer: Tinder Honours Project for Carleton institution Samuel Prashker – 100755635 monitored by: Dr. Dwight Deugo college of pc technology Carleton University Ottawa, Canada

Abstract Many programs found on smart phones manage that program because of the simplicity, simplicity of use, and portability. However, several of these solutions do not have any features that hinges on the cellular program it self. Tinder, for instance, a mobile relationships application, was developed and developed when it comes down to main intent behind running on Android and new iphone 4, restricting entry to those main ecosystems. From a security standpoint so when a proof of concept in giving support to the argument against mobile special solutions, the Android type of Tinder might reverse designed to operate on a normal desktop through a Universal screens Platform application, dubbed: Tindows.

Acknowledgments I wish to thank my buddies which nicely contributed her mobile devices through the start procedures associated with task. With out them I would personally n’t have had the opportunity to start the lengthy and difficult procedure for circle sniffing and reverse technology. I wish to thank Curtis Schouten for offering his house windows 10 Tablet for examination associated with the universal software codebase on a real portable unit. I’d in addition love to especially give thanks to by name Patrick Cuerrier and Issa-Albert Kane getting real people that have been ready to contribute their unique profile during building from the software. Without her realworld information, most insects wouldn’t normally being recognized.

Desk of materials 1. Introduction . 5

Background . 9 2.1.

Representational state transfer . 11

Safe Sockets Layer (SSL) . 11

Establishing Android to Proxy site visitors through a Remote PC . 13

Circumventing Encrypted SSL visitors with a Man-In-The-Middle fight . 14

Documenting the Login procedure for Tinder . 16

Documenting the API Telephone Calls of Criterion Tinder Task. 18

Tinder’s Upgrade Circle . 21

Initial Step of Porting – promoting a Tinder customer Library in C#. 23

Universal house windows system and getting the myspace OAuth Token . 25

XAML and Information Binding . 28

Tindows – The “SuperficialPage” . 29

Tindows – The “ConversationPage” . 31

Tindows – Notification . 33

Success and Validation. 35 4.1.

Validating the TinderAPI . 35

Validating the User Interface and Application event . 36

Summary. 39 5.1.

Future Efforts . 40

6. Recommendations . 42 7. Appendix . 43

1. Introduction 1.1.

Using boom in smartphone use and rise in popularity of cellular app ecosystems restricted to cellular programs (Bing Play shop, fruit software Store, Microsoft shop), solutions having practical or convenient usages on traditional platforms instance Desktops are left during the particles as forgotten about. Programs are being only developed for special cellular practices. There’s no desktop portal getting provided, but quite simply a web site to promote the smartphone program. This plan of exclusivity can restrict customers’ solutions whenever choosing which software buying, which devices to own and which ecosystems to tie on their own to. Exercise tracking and calorie-counting applications become an example of an issue definitely solved platformindependent. For example, MyFitnessPal offers all potential strategies to make use of her system: Android, new iphone 4, screens cellphone, and a totally highlighted website providing close features for the mobile applications. More solutions that begun ahead of the introduction of smartphones have precisely ported their unique solutions to mobile systems (ex: PayPal, e-bay, Amazon, Gmail, etc.). The trouble consist programs and companies that spawn solely with a focus about mobile marketplace. One issue is Tinder: a dating software for Android os and new iphone merely. Despite online-dating being a traditionally platform agnostic difficulty, Tinder sadly confines its users to two networks. Can you imagine the user switches to a Windows telephone? Can you imagine a user do not have a phone and would like to access it on the Mac or windowpanes maker? There is absolutely no functionality made available from Tinder that as a requirement needs a mobile system. Therefore, i am attempting to solve this by determining the client-server architecture of Tinder and porting they to a Desktop clients that interacts with Tinder’s computers.

The determination behind developing a desktop computer program tends to be divided into certain driving forces. Mostly, as culmination of my 4 decades within a Computer and Internet protection concentrated flow, a project that demonstrates those honed abilities was a worthy cause to follow. In determining how Tinder communicates to its hosts, from a security point of view, there’ll probably end up being lots of obstacles to conquer, safety measures to circumvent and ideas to spoof. More than likely your client produced will have to “act” like a mobile tool. The elegance associated with security set up should determine the difficulty in completing this. Second, as someone who does not look at the pc system getting a dying market, i’m truly european dating service powered to make certain the success. While this task is only an educational proof-of-concept that it can performed, the message to eliminate is that it is possible to perform, and this should be done. Programs created for cellular program needs to have just as available pc countertop section (provided the application cannot depend on non-traditional Desktop gear such as camcorder, GPS, flash light). Third, that is a project that may call for using technologies that have been glanced over within my researches. In identifying the traffic being sent across cable, you can find several gear instance Wireshark that may have to be learned and placed on this task. Furthermore, when there is usability the software carries out in the product, it will be possible a de-compilation on the program is required (when it comes to Android it could imply de-assembling the application to “smali” structure, something i’ve never ever completed but have always been pushed to understand).

The first purpose is always to establish all ways of telecommunications Tinder do to execute their application usability, like (although not limited by) how can Tinder connect and authenticate to Twitter, how can they speak and authenticate to their very own hosts, and just how carry out they obfuscate or encrypt or perhaps protected her communications networks. What sang within the 6

Recommended Posts