ios-reverse
IOS reverse
We need a MacOS(or VMWare Virtual Machine)(Version > MacOS 10.15) and Ipad/Iphone(Version > iOS 11). We can refer to link1.
Step0: ipad 7th root
Step1: APP unshell
Ios’s App is similar to APK, and it could install an app in our iPhone. Compared to android, a more strict security mechanism is used by Apple, such as ASLR and encryption (fairplay DRM encryption). First of all, there are some tools to help us:
1 | 1. MachOView. |
App files are encrypted (fairplay DRM, Digital Rights Management) in many situations, DRM is similar to shell encryption. We should decrypt IPA file first, but there is also a easier way to do this. That is, directly download decrypted IPA files from DumpApp. Otherwise, we need to remove DRM, which is also called 砸壳.
There are many tools to remove DRM:
1 | 1. Static: Iridium, fouldecrypt. |
After using tools, we will get IPA file. IPA file is a zip file. Then we need to verify whether DRM is removed. The steps is:
1 | 1. Find IPA file and enter. |
When we unzip IPA file, we will get some files/folders:
1 | 1. xx.app. |
Step2: export header file
After remove DRM protection, we can export header file from IPA file, then we could find hook point. class-dump is a good tool to export header file.
1 | class-dump -S -s -H IPA_file_name -o header_save_path |
To be continued…
References
[1] https://juejin.cn/post/6934667546301825038
[2] https://hello-david.github.io/archives/82a2b295.html
留言
- 文章链接: https://wd-2711.tech/
- 版权声明: 本博客所有文章除特别声明外,均采用 CC BY-NC-ND 4.0 许可协议。转载请注明出处!