This document discusses reverse engineering an Android application called Scramble With Friends to extract a word list resource. It provides a 7 step approach: 1) Extract and disassemble the APK, 2) Investigate the code to find the resource, 3) Compile a local server into a donor app, 4) Extract and inject the server into the target app, 5) Patch the app to serve the resource on launch, 6) Implement serialization on the server, and 7) Rebuild the APK. The goal is to have the server transmit the word list back to a connected host for analysis.