
APK reverse engineering or mobile traffic interception
- or -
Post a project like this24
$200
- Posted:
- Proposals: 5
- Remote
- #4438845
- OPPORTUNITY
- Open for Proposals
Description
Experience Level: Entry
https://play.google.com/store/apps/details?id=org.cris.aikyam&hl=en_IN
Scope: Confirm the active APK version by identifying the exact User-Agent header sent by the app, or by locating the version string inside the decompiled APK.
Inputs I will provide: APK file (or device access instructions).
Two candidate strings (compare against):
User-Agent: Aikyam/Android2.1.8-156
bmirak: androidsa
This is the latest version.
"Aikyam/Android2.1.20-172####androidsa"
And this one is the old version.
Network sniffing: Configure device to use your proxy (Fiddler/mitmproxy) and capture an app request; decrypt HTTPS if necessary. Provide raw request headers (screenshot or exported session).
Decompilation: Decompile the APK (e.g., using JADX/Apktool) and locate User-Agent or version metadata in code/resources/manifest; provide the exact file and line showing the string.
Deliverables:
Primary: Clear statement which User-Agent is currently in use on the running app.
Evidence (choose at least one):
Fiddler/mitmproxy session screenshot showing User-Agent header, or
Decompiled file snippet (e.g., AndroidManifest.xml, smali, or Java/Kotlin source) showing the version/UA string, and a screenshot of the decompiler output.
urgent need in 5 hr
Scope: Confirm the active APK version by identifying the exact User-Agent header sent by the app, or by locating the version string inside the decompiled APK.
Inputs I will provide: APK file (or device access instructions).
Two candidate strings (compare against):
User-Agent: Aikyam/Android2.1.8-156
bmirak: androidsa
This is the latest version.
"Aikyam/Android2.1.20-172####androidsa"
And this one is the old version.
Network sniffing: Configure device to use your proxy (Fiddler/mitmproxy) and capture an app request; decrypt HTTPS if necessary. Provide raw request headers (screenshot or exported session).
Decompilation: Decompile the APK (e.g., using JADX/Apktool) and locate User-Agent or version metadata in code/resources/manifest; provide the exact file and line showing the string.
Deliverables:
Primary: Clear statement which User-Agent is currently in use on the running app.
Evidence (choose at least one):
Fiddler/mitmproxy session screenshot showing User-Agent header, or
Decompiled file snippet (e.g., AndroidManifest.xml, smali, or Java/Kotlin source) showing the version/UA string, and a screenshot of the decompiler output.
urgent need in 5 hr

Lolum B.
0% (0)Projects Completed
1
Freelancers worked with
1
Projects awarded
67%
Last project
16 Sep 2025
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies