1 00:00:00,120 --> 00:00:05,250 As we said earlier, PPK file is nothing but a compressed or zip file. 2 00:00:05,880 --> 00:00:08,250 So why don't we just uncompressed the file? 3 00:00:08,700 --> 00:00:13,620 I will show you here why we need to decode a file rather than Uncompress it. 4 00:00:14,370 --> 00:00:21,600 Go to the getups link here and download the Trojan DOT APJ file, the file that we've created in this 5 00:00:21,600 --> 00:00:25,320 course using methods like I've already downloaded that. 6 00:00:25,440 --> 00:00:27,210 And it is here on my desktop. 7 00:00:27,540 --> 00:00:32,940 If you Double-Click on that file, you'll be able to see the components of the AP case file. 8 00:00:33,570 --> 00:00:40,680 As we've said, we have the Android manifested SML Resources glasses, though, the X and the Mitta 9 00:00:41,070 --> 00:00:41,640 folder. 10 00:00:41,970 --> 00:00:49,530 Now let me extract the Android, my first thought SML and tried to open that, as you can see. 11 00:00:50,190 --> 00:00:51,690 Let me expand that here a little. 12 00:00:55,000 --> 00:00:58,780 As you can see, I am not able to read the file. 13 00:00:59,170 --> 00:01:08,320 If I just uncompressed it, thus, we need to use the APC a tool to decode the Trojan DOT, APC, a 14 00:01:08,320 --> 00:01:12,400 file and any HBK that you want to reverse engineer.