12.07.2015 Views

iPhone Rootkit? There's an App for that! - Reverse Engineering Mac ...

iPhone Rootkit? There's an App for that! - Reverse Engineering Mac ...

iPhone Rootkit? There's an App for that! - Reverse Engineering Mac ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Decrypt The Binary <strong>for</strong> ReversingCrackulous, xcrack, etc. But how how do they work?1. Find the app binary on the iDevice# find /var/mobile/<strong>App</strong>lications –name Some<strong>App</strong>.app/var/mobile/<strong>App</strong>lications/0578A160-…/Some<strong>App</strong>.app2. Get the size of the encrypted code/data section# otool –l …/0578A…/Some<strong>App</strong>.app/Some<strong>App</strong> |grep –A4 LC_ENCRYPTION_INFOcmd LC_ENCRYPTION_INFOcmdsize 20cryptoff 4096cryptsize 4096cryptid 13. Load the executable in a debugger (gdb is a cydia package)# gdb …/Some<strong>App</strong>.app/Some<strong>App</strong>See: dvlabs.tippingpoint.com/blog/2009/03/06/reverse-engineering-iphone-appstore-binariesCopyright Trustwave 2010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!