解密 ios app July 14, 2015 源码在这里 https://github.com/stefanesser/dumpdecrypted/ 编译好后把 1 dumpdecrypted.dylib 放到 1 /usr/lib/dumpdecrypted.dylib 连上 ssh iPhone:/ root# cd / iPhone:/ root# DYLD_INSERT_LIBRARIES=/usr/lib/dumpdecrypted.dylib /var/mobile/Containers/Bundle/Application/7F3190A0-6BE1-4562-BA54-AE0069FA5B1D/IF.app/IF mach-o decryption dumper DISCLAIMER: This tool is only meant for security research purposes, not for application crackers. [+] detected 32bit ARM binary in memory. [+] offset to cryptid found: @0xa2a08(from 0xa2000) = a08 [+] Found encrypted data at address 00004000 of length 13139968 bytes - type 1. [+] Opening /private/var/mobile/Containers/Bundle/Application/7F3190A0-6BE1-4562-BA54-AE0069FA5B1D/IF.app/IF for reading. [+] Reading header [+] Detecting header type [+] Executable is a FAT image - searching for right architecture [+] Correct arch is at offset 16384 in the file [+] Opening IF.decrypted for writing. [+] Copying the not encrypted start of the file [+] Dumping the decrypted data into the file [+] Copying the not encrypted remainder of the file [+] Setting the LC_ENCRYPTION_INFO->cryptid to 0 at offset 4a08 [+] Closing original file [+] Closing dump file iPhone:/ root# 会在当前目录生成 IF.decrypted, 拷出来, 拖进 IDA iOS 8.3/8.4 下修改 bin 后闪退的问题: 先解密 再把原始 bin 改名 修改解密后的 bin ldid -s 给解密后的 bin 签名 Read More Fuck 蝉大师 Continue reading Rebuild Explorer icon cache Published on June 28, 2016 VS 2015 编译 PyQt Published on December 03, 2015