iOS 逆向工程 app安全 网络安全iOS逆向工程iOS精品文章-逆向

iOS 10 使用 dumpdecrypted 砸壳

2017-08-28  本文已影响352人  一只代码狗
《ios应用逆向工程:分析与实战》这本书中讲到的砸壳方法适用于32位较老设备,本文介绍在 iOS10.0.1 iPad Air 64位设备上使用 dumpdecrypted为 AppStore 上的 App 砸壳!
dyld: could not load inserted library 'dumpdecrypted.dylib' because no suitable image found.  Did find:
            dumpdecrypted.dylib: stat() failed with errno=1
Trace/BPT trap: 5
DaFenQI@MrZz:~/Desktop/dumpdecrypted% ssh root@localhost -p 2222
root@localhost's password: 
DaFenQiiPad:~ root# 

登录成功后使用 ps-e 命令查看设备中运行的进程,找到 App 可执行文件的路径,类似 /var/mobile/Containers/Bundle/Application/XXXXXXXX- XXXX-XXXX-XXXX- XXXXXXXXXXXX/TargetApp.app/。


image.png
DYLD_INSERT_LIBRARIES=/path/to/dumpdecrypted.dylib /path/to/executable
dyld: could not load inserted library 'dumpdecrypted.dylib' because no suitable image found.  Did find:
    dumpdecrypted.dylib: required code signature missing for 'dumpdecrypted.dylib'
Abort trap: 6
DaFenQiiPad:/root# ldid -S private/var/mobile/Containers/Data/Application/FC66F79B-E67C-4746-845E-AB20778AA036/Documents/dumpdecrypted.dylib
DISCLAIMER: This tool is only meant for security research purposes, not for application crackers.

[+] detected 64bit ARM binary in memory.
[+] offset to cryptid found: @0x1000ccc58(from 0x1000cc000) = c58
[+] Found encrypted data at address 00004000 of length 15843328 bytes - type 1.
[+] Opening /private/var/containers/Bundle/Application/B9DBC5DA-4F84-46E6-8C8D-3BA68CD32AB9/EE_VKO.app/EE_VKO for reading.
[+] Reading header
[+] Detecting header type
[+] Executable is a plain MACH-O image
[+] Opening EE_VKO.decrypted for writing.
[+] Copying the not encrypted start of the file
[+] Dumping the decrypted data into the file
[+] Copying the not encrypted remainder of the file
[+] Setting the LC_ENCRYPTION_INFO->cryptid to 0 at offset c58
[+] Closing original file
[+] Closing dump file

参考资料:《ios应用逆向工程:分析与实战》

上一篇下一篇

猜你喜欢

热点阅读