Jump to content

cinderace

Newbie
  • Posts

    3
  • Joined

  • Last visited

Profile Information

  • iDevice
    iPhone 7 Plus
  • iOS Version
    14.4.2
  • Jailbroken
    Yes
  • Rooted
    No
  • Location
    on my bed rn

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

cinderace's Achievements

Newbie

Newbie (1/14)

  • Supporter
  • One Month Later
  • Dedicated
  • Week One Done
  • Conversation Starter

Recent Badges

0

Reputation

  1. Well that was a quick update. Thanks X204!
  2. Thanks, it's really impressive work. My only issue is that I am stuck on an infinite loop of "your device is rooted", "your device is banned" and "account banned for cheating" (because rooted device detected = insta ban, standoff does not play around). I tried using Liberty, KernBypass and A-Bypass to no avail. Any tips? Thanks!
  3. Hey, really nice tutorial, it gave me a nice motivation to start hacking on iOS devices too! I've been trying to reverse engineer Head Soccer as my first proper project but I really did not understand how ASLR works on ARM64. (lldb) image list "headsoccer" [ 0] 177C24B9-537F-3B7A-ACDF-74DDC1B4D35B 0x00000001022d8000 /private/var/containers/Bundle/Application/028CC5F9-515B-4E52-8380-ED4D992353B8/headsoccer.app/headsoccer (lldb) According to the guide I need to take the last 5 hex digits of the address 0x1022d8000, aka d8000 but I wonder if this is always the case or if the ASLR slide could include more or less digits (like 0x4000 or 0x100000). Many thanks for publishing this guide!
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines