1 MAC工具
1.1 class dump 利用OC runtime 特性 把Mach-O文件中的@interface 和@protocol 提取出來并生成對應(yīng)的.h文件。 安裝方法 見
http://www.lxweimin.com/p/1e3fe0a8c048
使用
class-dump -H /Applications/Calculator.app -o ~/Desktop/dump/Calculate-dump
/Applications/Calculator.app 是 Mac 上計(jì)算器應(yīng)用的路徑。
~/Desktop/dump/Calculate-dump 是指定的存放 dump 出來頭文件的文件夾路徑。
缺點(diǎn) 只能作用于未經(jīng)過加密的文件 通常appstore 下載的ipa都經(jīng)過加密 怎么辦呢? 也就是下個工具 砸殼工具 AppCrackr
1.2 AppCrackr
1.3 Theos
安裝 > http://www.lxweimin.com/p/d8a7e0381ff7
終端操作 使用 (路徑為桌面)
johndeMacBook:Desktop john$ nic.pl
NIC 2.0 - New Instance Creator
[1.] iphone/activator_event
[2.] iphone/application_modern
[3.] iphone/cydget
[4.] iphone/flipswitch_switch
[5.] iphone/framework
[6.] iphone/ios7_notification_center_widget
[7.] iphone/library
[8.] iphone/notification_center_widget
[9.] iphone/preference_bundle_modern
[10.] iphone/tool
[11.] iphone/tweak
[12.] iphone/xpc_service
Choose a Template (required): 11
Project Name (required): rck
Package Name [com.yourcompany.rck]: com.horck.rck
Author/Maintainer Name [john]: rck
[iphone/tweak] MobileSubstrate Bundle filter [com.apple.springboard]: com.horck.ck
[iphone/tweak] List of applications to terminate upon installation (space-separated, '-' for none) [SpringBoard]: horck
Instantiating iphone/tweak in rck/...
Done.
在桌面生成文件
control文件記錄deb包管理系統(tǒng)所需基本信息,會被打進(jìn)包中
具體字段信息可以參考debian官網(wǎng) http://www.debian.org/doc/debian-policy/ch-controlfields.html
reveal 查看app結(jié)構(gòu)
安裝
具體查看查看 http://www.lxweimin.com/p/5236ba228076
問題參考 --------------- http://blog.csdn.net/quanqinyang/article/details/70872489
砸殼工具
下載地址> https://github.com/stefanesser/dumpdecrypted
在目錄路徑直接 運(yùn)行“make” 命令 生成
1 尋找app包的地址
/var/mobile/Containers/Bundle/Application/用于存放StoreApp的應(yīng)用
/var/mobile/Containers/Data/Application/用于存放StoreApp的應(yīng)用數(shù)據(jù)
1.1 鏈接終端越獄手機(jī) " ssh root@ " 密碼為 alpine
1.2 手機(jī)殺死所有沒必要的app 只留下需要砸殼的app 終端輸入 "ps -e" 獲取手機(jī)中所有進(jìn)程 ( 如果提示 ps指令不存在 那就需要到 cydia 當(dāng)中安裝 adv-cmds 包。)
yanshude-iPhone:~ root# ps -e
PID TTY TIME CMD
1 ?? 1:30.63 /sbin/launchd
194 ?? 1:17.02 /usr/sbin/syslogd
/System/Library/Frameworks/Accounts.framework/accountsd
220 ?? 0:04.04 /System/Library/PrivateFrameworks/TCC.framework/tccd
230 ?? 0:06.79 /System/Library/PrivateFrameworks/IMCore.framework/imagent.app/imagent
233 ?? 0:40.82 /usr/libexec/configd
242 ?? 0:34.91 /usr/libexec/securityd
244 ?? 0:00.80 /usr/sbin/distnoted daemon
248 ?? 0:20.48 /usr/libexec/networkd
/Applications/Contacts.app/PlugIns/ContactsCoreSpotlightExtension.appex/ContactsCoreSpotlightExtension
1485 ?? 0:51.65 /var/containers/Bundle/Application/EF3744E4-0EC2-47BE-BF2B-2422CFF1D69A/Taobao4iPhone.app/Taobao4iPhone
3511 ?? 0:00.07 /System/Library/Frameworks/UIKit.framework/Support/pasteboardd
出來很多條目可以用“/var/containers/Bundle/Application/” 搜索定位 (作者在做的時候出現(xiàn)個問題就是“/var/containers/Bundle/Application/EF3744E4-0EC2-47BE-BF2B-2422CFF1D69A/Taobao4iPhone.app/Taobao4iPhone” 只出現(xiàn)了一半 類似這樣 "/var/containers/Bundle/Application/EF3744E4-0EC2-47BE" 解決辦法就是把終端顯示框拉寬點(diǎn)。。 沒出現(xiàn)的請繞路)
1.3 使用 Cycript 找到目標(biāo)應(yīng)用的 Documents 目錄路徑。
需要越獄手機(jī)在 cydia 上搜索 cycript 并安裝就可以了。
yanshude-iPhone:~ root# cycript -p Taobao4iPhone
cy# NSHomeDirectory()
@"/var/mobile/Containers/Data/Application/AA7CA85F-CDDD-4BC2-995D-97A3A9FAC250"
退出 Cycript 按control + d
1.4 把 dumpdecrypted.dylib 文件添加到目標(biāo)app的Documents 文件夾下 作者這里是用的 cyberduck 連接的手機(jī)(工具有很多種 個人比較喜歡可視化??)
然后把dumpdecrypted.dylib 拖拽到Documents文件夾下
1.5 終端操作 cd “/var/mobile/Containers/Data/Application/AA7CA85F-CDDD-4BC2-995D-97A3A9FAC250/Documents” 想要查看app的路徑下 執(zhí)行砸殼操作
執(zhí)行命令
yanshude-iPhone:/var/mobile/Containers/Data/Application/AA7CA85F-CDDD-4BC2-995D-97A3A9FAC250/Documents root# /var/containers/Bundle/Application/EF3744E4-0EC2-47BE-BF2B-2422CFF1D69A/Taobao4iPhone.app/Taobao4iPhone
Killed: 9
yanshude-iPhone:/var/mobile/Containers/Data/Application/AA7CA85F-CDDD-4BC2-995D-97A3A9FAC250/Documents root# su mobile
yanshude-iPhone:~/Containers/Data/Application/AA7CA85F-CDDD-4BC2-995D-97A3A9FAC250/Documents mobile$ DYLD_INSERT_LIBRARIES=dumpdecrypted.dylib /var/containers/Bundle/Application/EF3744E4-0EC2-47BE-BF2B-2422CFF1D69A/Taobao4iPhone.app/Taobao4iPhone
mach-o decryption dumper
DISCLAIMER: This tool is only meant for security research purposes, not for application crackers.
[+] detected 64bit ARM binary in memory.
[+] offset to cryptid found: @0x1000d0f20(from 0x1000d0000) = f20
[+] Found encrypted data at address 00004000 of length 58884096 bytes - type 1.
[+] Opening /private/var/containers/Bundle/Application/EF3744E4-0EC2-47BE-BF2B-2422CFF1D69A/Taobao4iPhone.app/Taobao4iPhone for reading.
[+] Reading header
[+] Detecting header type
[+] Executable is a plain MACH-O image
[+] Opening Taobao4iPhone.decrypted for writing.
[+] Copying the not encrypted start of the file
[+] Dumping the decrypted data into the file
[+] Copying the not encrypted remainder of the file
[+] Setting the LC_ENCRYPTION_INFO->cryptid to 0 at offset f20
[+] Closing original file
[+] Closing dump file
yanshude-iPhone:~/Containers/Data/Application/AA7CA85F-CDDD-4BC2-995D-97A3A9FAC250/Documents mobile$
PS :作者出現(xiàn)過問題 " Killed:9 " 執(zhí)行 " su mobile" 再次執(zhí)行上圖第一條命令
參考 : iOS逆向使用dumpdecrypted給app砸殼http://www.lxweimin.com/p/14db1ac34bf1
iOS 逆向手把手教程之一 http://www.swiftyper.com/2016/05/02/iOS-reverse-step-by-step-part-1-class-dump/