iOS逆向记录(二)

2017-08-08  本文已影响154人  Flonger
4.Cycript工具介绍(作者:saurik,官网:http://www.cycript.org/
  //WeChat  cycript -p WeChat
  [[UIApplication sharedApplication] setStatusBarHidden:YES]   //隐藏状态栏
  [[UIApplication sharedApplication] setStatusBarHidden:NO]    //显示状态栏

  [[[UIAlertView alloc]initWithTitle:@"Tanzhou" message:@"Hello luz" delegate:ni cancelButtonTitle:@"ok" otherButtonTitles:nil, nil] show]            //弹框

  [[UIApplication sharedApplication] setApplicationIconBadgeNumber:1000]   //设置badge数字 
  [[UIApplication sharedApplication] setApplicationIconBadgeNumber:1]
  [[UIApplication sharedApplication] setApplicationIconBadgeNumber:0]
  [[UIApplication sharedApplication] setApplicationIconBadgeNumber:0]

  //SpringBroad cycript -p SpringBoard
  [[SBScreenShotter sharedInstance] saveScreenshot:YES]   截屏,闪光
  [[SBScreenShotter sharedInstance] saveScreenshot:NO]   截屏,不闪光
  [[SBScreenFlash mainScreenFlasher] flashColor:[UIColor magentaColor] withCompletion:nil] 屏幕闪紫色光

5.逆向的基本思路

从二进制码中提取设计概念和算法

逆向是一个试错的过程,需要不停的猜测、查找和进行验证,既考验耐心也考验动手能力

6.程序、进程、线程、内存结构的概念

7.逆向工具集和安装和使用

    定位要砸壳的StoreApp的执行文件名字TargetApp (ps -e 可以得到全路径)  

    定位要砸壳的StoreApp的Document目录:
    cycript -p TargetApp
    [[NSFileManager defaultManager]URLsForDirectory:NSDocumentDirectory inDomains:NSUserDomainMask][0]

    得到路径:#"file:///var/mobile/Containers/Data/Application/986376B5-EF08-4CAF-81FB-CAE48D1FE4AE/Documents/"

    进入Document目录: cd  /var/mobile/Containers/Data/Application/986376B5-EF08-4CAF-81FB-CAE48D1FE4AE/Documents/
    拷贝dumpdecrypted.dylib: cp  dumpdecrypted.dylib .


    DYLD_INSERT_LIBRARIES=dumpdecrypted.dylib /var/mobile/Containers/Bundle/Application/749DC69A-3A8D-4B5C-9926-1220E69FC85F/WeChat.app/WeChat
 
$ brew install --from-bottle https://raw.githubusercontent.com/Homebrew/homebrew-core/7a4dabfc1a2acd9f01a1670fde4f0094c4fb6ffa/Formula/dpkg.rb
$ brew pin dpkg
dpkg -i/-r  deb包安装/卸载
dpkg -s com.iosre.myiosreproject 查看安装包信息
上一篇下一篇

猜你喜欢

热点阅读