Urinx / iOSAppHook

专注于非越狱环境下iOS应用逆向研究,从dylib注入,应用重签名到App Hook

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

最近iOS 9.3可以越狱了, 但是在9.3越狱设备上砸壳, cycript等工具貌似出现问题

SouHanaQiao opened this issue · comments

commented

If you use dumpdecrypted to decrypt Mach-O, the solution below maybe useful for you

  1. copy dumpdecrypted.dylib into /usr/lib. Make sure it has appropriate permissions so that user mobile can read and execute it

-rwxr-xr-x 1 root wheel 197528 Aug 14 16:22 dumpdecrypted.dylib

  1. change user to mobile:

su mobile

  1. change directory into somewhere that mobile can write to:

cd /var/mobile/Documents

  1. execute the command with absolute paths:

DYLD_INSERT_LIBRARIES=/usr/lib/dumpdecrypted.dylib /var/containers/Bundle/Application/59CEB222-4C4D-4A34-BC0F-8D38B9E3853D/MyApp.app/MyApp

  1. then, you'll have the MyApp.decrypted file in the current directory

Tested on Pangu jailbroken iOS 9.3.3