Jump to content

3 posts in this topic

Recommended Posts

Posted

After i loaded a binary in IDA, i search for ptrace and sysctl in Import. I did not found any ptrace but i found sysctl.

Does this mean the binary does not have any ptrace to block me from attach with gdb but it has sysctl to block it? (when i try to debugserver host: binary, i got error segment fail 11). and i foudn this too .

 BLX             _sysctl
CBZ             R0, loc_E7B194
MOV            R0, #(aSSysctlFailedW - 0xE7B18C) ; "%s: sysctl failed while trying to get k"...
MOV            R1, #(aClsprocessdebu - 0xE7B18E) ; "CLSProcessDebuggerAttached"
ADD             R0, PC  ; "%s: sysctl failed while trying to get k"...
ADD             R1, PC  ; "CLSProcessDebuggerAttached"
BL                sub_E77FF4
MOVS          R0, #0

B                  loc_E7B19E

 

any one have any idea to how deal with this

Posted

@@DarkArrow

 

Look for the function which has memset, getpid near sysctl and then NOP if you see something like this:

 

MOVS R1, #0x1F

mov #r0,0x1F

mov r1,#0x1F

Posted (edited)

@@DarkArrow

 

Look for the function which has memset, getpid near sysctl and then NOP if you see something like this:

 

MOVS R1, #0x1F

mov #r0,0x1F

mov r1,#0x1F

i am confuse.

 

@@DarkArrow

 

Look for the function which has memset, getpid near sysctl and then NOP if you see something like this:

 

MOVS R1, #0x1F

mov #r0,0x1F

mov r1,#0x1F

i dont see any thing like

MOVS R1, #0x1F

mov #r0,0x1F

mov r1,#0x1F

Also the only function i see is sub_E77FF4 and it does not contain _menset or getpid.

i look at other sub at contain sysctl but they dont have any sub around them only loc_x

 

__text:00E7B134 sub_E7B134                              ; CODE XREF: sub_E75A2C:loc_E75C24p

__text:00E7B134

__text:00E7B134 var_214         = -0x214

__text:00E7B134 var_210         = -0x210

__text:00E7B134 var_20C         = -0x20C

__text:00E7B134 var_208         = -0x208

__text:00E7B134 var_1F8         = -0x1F8

__text:00E7B134 var_1C          = -0x1C

__text:00E7B134 var_18          = -0x18

__text:00E7B134 var_14          = -0x14

__text:00E7B134 var_10          = -0x10

__text:00E7B134 var_C           = -0xC

__text:00E7B134

__text:00E7B134                 PUSH            {R4,R5,R7,LR}

__text:00E7B136                 ADD             R7, SP, #8

__text:00E7B138                 SUB.W           SP, SP, #0x20C

__text:00E7B13C                 MOVW            R0, #(:lower16:(___stack_chk_guard_ptr - 0xE7B14C))

__text:00E7B140                 MOVS            R5, #0

__text:00E7B142                 MOVT.W          R0, #(:upper16:(___stack_chk_guard_ptr - 0xE7B14C))

__text:00E7B146                 MOVS            R1, #0xE

__text:00E7B148                 ADD             R0, PC ; ___stack_chk_guard_ptr

__text:00E7B14A                 LDR             R4, [R0] ; ___stack_chk_guard

__text:00E7B14C                 LDR             R0, [R4]

__text:00E7B14E                 STR             R0, [sP,#0x214+var_C]

__text:00E7B150                 MOVS            R0, #1

__text:00E7B152                 STR             R0, [sP,#0x214+var_1C]

__text:00E7B154                 STR             R1, [sP,#0x214+var_18]

__text:00E7B156                 STR             R5, [sP,#0x214+var_1F8]

__text:00E7B158                 STR             R0, [sP,#0x214+var_14]

__text:00E7B15A                 BLX             _getpid

__text:00E7B15E                 STR             R0, [sP,#0x214+var_10]

__text:00E7B160                 MOV.W           R0, #0x1EC

__text:00E7B164                 STR             R0, [sP,#0x214+var_20C]

__text:00E7B166                 ADD             R0, SP, #0x214+var_1C ; int *

__text:00E7B168                 ADD             R2, SP, #0x214+var_208 ; void *

__text:00E7B16A                 ADD             R3, SP, #0x214+var_20C ; size_t *

__text:00E7B16C                 MOVS            R1, #4  ; u_int

__text:00E7B16E                 STR             R5, [sP,#0x214+var_214] ; void *

__text:00E7B170                 STR             R5, [sP,#0x214+var_210] ; size_t

__text:00E7B172                 BLX             _sysctl

__text:00E7B176                 CBZ             R0, loc_E7B194

__text:00E7B178                 MOV             R0, #(aSSysctlFailedW - 0xE7B18C) ; "%s: sysctl failed while trying to get k"...

__text:00E7B180                 MOV             R1, #(aClsprocessdebu - 0xE7B18E) ; "CLSProcessDebuggerAttached"

__text:00E7B188                 ADD             R0, PC  ; "%s: sysctl failed while trying to get k"...

__text:00E7B18A                 ADD             R1, PC  ; "CLSProcessDebuggerAttached"

__text:00E7B18C                 BL              sub_E77FF4

__text:00E7B190                 MOVS            R0, #0

__text:00E7B192                 B               loc_E7B19E

__text:00E7B194 ; ---------------------------------------------------------------------------

__text:00E7B194

__text:00E7B194 loc_E7B194                              ; CODE XREF: sub_E7B134+42j

__text:00E7B194                 LDRB.W          R0, [sP,#0x214+var_1F8+1]

__text:00E7B198                 AND.W           R0, R0, #8

__text:00E7B19C                 LSRS            R0, R0, #3

__text:00E7B19E

__text:00E7B19E loc_E7B19E                              ; CODE XREF: sub_E7B134+5Ej

__text:00E7B19E                 LDR             R1, [sP,#0x214+var_C]

__text:00E7B1A0                 LDR             R2, [R4]

__text:00E7B1A2                 SUBS            R1, R2, R1

__text:00E7B1A4                 ITT EQ

__text:00E7B1A6                 ADDEQ.W         SP, SP, #0x20C

__text:00E7B1AA                 POPEQ           {R4,R5,R7,PC}

__text:00E7B1AC                 BLX             ___stack_chk_fail

__text:00E7B1AC ; End of function sub_E7B134

__text:00E7B1AC

 

PS this sub is being by another that have this

text:00E75C24 loc_E75C24                              ; CODE XREF: sub_E75A2C+1DCj

__text:00E75C24                 BL              sub_E7B134

__text:00E75C28                 LDR             R1, [R5]

__text:00E75C2A                 STRB            R0, [R1,#1]

__text:00E75C2C                 LDR             R0, [R5]

__text:00E75C2E                 LDR.W           R1, [R8,#4]

__text:00E75C32                 STR             R1, [R0,#0x10]

__text:00E75C34                 LDR.W           R1, [R8,#0xC]

__text:00E75C38                 STR             R1, [R0,#0x14]

__text:00E75C3A                 LDRB.W          R1, [R8,#8]

__text:00E75C3E                 STRB            R1, [R0,#0x18]

__text:00E75C40                 ADDS            R0, #0x34

__text:00E75C42                 BL              sub_E762C8

__text:00E75C46                 LDRD.W          R0, R1, [R5]

__text:00E75C4A                 MOVW            R2, #0x3008

__text:00E75C4E                 ADD             R1, R2

__text:00E75C50                 ADD.W           R0, R0, #0x184

__text:00E75C54                 BL              sub_E7E22C

__text:00E75C58                 LDRD.W          R0, R1, [R5]

__text:00E75C5C                 ADDS            R1, #8

__text:00E75C5E                 ADDS            R0, #0x1C

__text:00E75C60                 BL              sub_E5FB3C

__text:00E75C64                 LDR             R0, [R5]

__text:00E75C66                 LDRB            R1, [R0,#1]

__text:00E75C68                 CMP             R1, #0

__text:00E75C6A                 BEQ             loc_E75C86

__text:00E75C6C                 MOV             R0, #(aSDebuggerPrese - 0xE75C80) ; "%s: Debugger present - not installing h"...

__text:00E75C74                 MOV             R1, #(aClscontextinit - 0xE75C82) ; "CLSContextInitialize"

__text:00E75C7C                 ADD             R0, PC  ; "%s: Debugger present - not installing h"...

__text:00E75C7E                 ADD             R1, PC  ; "CLSContextInitialize"

__text:00E75C80                 BL              sub_E77FF4

__text:00E75C84                 B               loc_E75CAC

Updated by DarkArrow

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Our picks

    • Royal Match v30524 +10 Jailed Cheats [ Coins + More ]
      Modded/Hacked App: Royal Match By Dream Games Teknoloji Anonim Sirketi
      Bundle ID: com.dreamgames.royalmatch
      iTunes Store Link: https://apps.apple.com/us/app/royal-match/id1482155847?uo=4


      Mod Requirements:
      - Non-Jailbroken/Jailed or Jailbroken iPhone/iPad/iPod Touch.
      - Sideloadly / Cydia Impactor or alternatives.
      - A Computer Running Windows/macOS/Linux with iTunes installed.


      Hack Features:
      - Freeze Coins
      - Freeze Lives
      - Freeze Stars
      - Freeze Boosters
      - Freeze Time
      - Freeze Moves
      - Unlock VIP Badges
      - Unlock VIP Name Styles
      - Unlock VIP Frames
      - Auto Win -> Quit the level.


      Jailbreak required hack(s): [Mod Menu Hack] Royal Match v26455 +11 Cheats [ Unlimited Coins + More ] - Free Jailbroken Cydia Cheats - iOSGods
      Modded Android APK(s): https://iosgods.com/forum/68-android-section/
      For more fun, check out the Club(s): https://iosgods.com/clubs/
        • Informative
        • Like
      • 415 replies
    • Royal Match v30524 +10 Cheats [ Coins + More ]
      Modded/Hacked App: Royal Match By Dream Games Teknoloji Anonim Sirketi
      Bundle ID: com.dreamgames.royalmatch
      iTunes Store Link: https://apps.apple.com/us/app/royal-match/id1482155847?uo=4


      Mod Requirements:
      - Jailbroken iPhone/iPad/iPod Touch.
      - iGameGod / Filza / iMazing or any other file managers for iOS.
      - Cydia Substrate, ElleKit, Substitute or libhooker depending on your jailbreak.
      - PreferenceLoader (from Cydia, Sileo or Zebra).


      Hack Features:
      - Freeze Coins
      - Freeze Lives
      - Freeze Stars
      - Freeze Boosters
      - Freeze Time
      - Freeze Moves
      - Unlock VIP Badges
      - Unlock VIP Name Styles
      - Unlock VIP Frames
      - Auto Win -> Quit the level.


      Non-Jailbroken & No Jailbreak required hack(s): [IPA Mod Menu] Royal Match v26455 +11 Jailed Cheats [ Unlimited Coins + More ] - Free Non-Jailbroken IPA Cheats - iOSGods
      Modded Android APK(s): https://iosgods.com/forum/68-android-section/
      For more fun, check out the Club(s): https://iosgods.com/clubs/
        • Informative
        • Haha
      • 523 replies
    • Project Makeover v2.120.1 +4 Jailed Cheats [ Unlimited Currencies ]
      Modded/Hacked App: Project Makeover By Magic Tavern, Inc.
      Bundle ID: com.bgg.jump
      App Store Link: https://apps.apple.com/us/app/project-makeover/id1483058899?uo=4

       
       

      🤩 Hack Features

      - Unlimited Cash
      - Unlimited Coins
      - Unlimited Gems
      - Unlimited Lives

      This hack was made by @Cashlaz. Give him all your love & appreciation! ❤️
      • 26 replies
    • Project Makeover ( All Versions ) +4 Cheats [ Unlimited Currencies ]
      Modded/Hacked App: Project Makeover By Magic Tavern, Inc.
      Bundle ID: com.bgg.jump
      App Store Link: https://apps.apple.com/us/app/project-makeover/id1483058899?uo=4

       
       

      🤩 Hack Features

      - Unlimited Cash
      - Unlimited Coins
      - Unlimited Gems
      - Unlimited Lives

      This hack was made by @Cashlaz. Give him all your love & appreciation! ❤️
      • 11 replies
    • Hunt Royale: Action RPG Battle v3.15.1 +3 Jailed Cheats [ Damage & Defence ]
      Modded/Hacked App: Hunt Royale: Action RPG Battle By BoomBit, Inc.
      Bundle ID: com.hunt.royale
      iTunes Store Link: https://apps.apple.com/us/app/hunt-royale-action-rpg-battle/id1537379121?uo=4

       
       

      🚀 Hack Features

      - Dumb Enemies

      VIP
      - Damage Multiplier
      - Defence Multiplier
      • 178 replies
    • Hunt Royale: Action RPG Battle v3.15.1 +3 Cheats [ Damage & Defence ]
      Modded/Hacked App: Hunt Royale: Action RPG Battle By BoomBit, Inc.
      Bundle ID: com.hunt.royale
      iTunes Store Link: https://apps.apple.com/us/app/hunt-royale-action-rpg-battle/id1537379121?uo=4

       


      🚀 Hack Features

      - Dumb Enemies

      VIP
      - Damage Multiplier
      - Defence Multiplier
      • 33 replies
    • Pocket Survivor: Expansion 2d v2.02.2 [ +1+++ Cheats ] Unlimited All Off
      Modded/Hacked App: Pocket Survivor: Expansion 2d By APPWILL COMPANY LTD
      Bundle ID: develop.pocket.survivor.expansion
      App Store Link: https://apps.apple.com/us/app/pocket-survivor-expansion-2d/id1644395434?uo=4


      🤩 Hack Features

      - Unlimited ALL OFF


      • 1 reply
    • Pocket Survivor: Expansion 2d v2.02.2 [ +1+++ Jailed ] Unlimited All Off
      Modded/Hacked App: Pocket Survivor: Expansion 2d By APPWILL COMPANY LTD
      Bundle ID: develop.pocket.survivor.expansion
      App Store Link: https://apps.apple.com/us/app/pocket-survivor-expansion-2d/id1644395434?uo=4


      🤩 Hack Features

      - Unlimited ALL OFF


      • 1 reply
    • Immortal Rising 2 Cheats v1.3.12 +5
      Modded/Hacked App: Immortal Rising 2 By Planetarium Labs Pte. Ltd.
      Bundle ID: com.badbeans.immortalrising2
      iTunes Store Link: https://apps.apple.com/us/app/immortal-rising-2/id6467105374?uo=4

       


      Mod Requirements:
      - Jailbroken iPhone/iPad/iPod Touch.
      - iGameGod / Filza / iMazing or any other file managers for iOS.
      - Cydia Substrate, ElleKit, Substitute or libhooker depending on your jailbreak.
      - PreferenceLoader (from Cydia, Sileo or Zebra).


      Hack Features:
      - More damage
      - No CD
      - Earn more gold
      - Earn more exp
      - Freeze combokill
      - God mode
        • Like
      • 180 replies
    • Village Tales v0.2.1 [ +1 Cheats ] Currency Max
      Modded/Hacked App: Village Tales By Texas PFCG Aplicativos Ltda
      Bundle ID: com.city.urbi
      App Store Link: https://apps.apple.com/ph/app/storm-tale-2/id1575085199?uo=4


      🤩 Hack Features

      - Gems

      • 1 reply
    • Village Tales v0.2.1 [ +1 Jailed ] Currency Max
      Modded/Hacked App: Village Tales By Texas PFCG Aplicativos Ltda
      Bundle ID: com.city.urbi
      App Store Link: https://apps.apple.com/us/app/storm-tale-2/id1575085199?uo=4


      🤩 Hack Features

      - Gems

      • 1 reply
    • Sago Mini World: Kids Games Modded v8.3.1536 +1
      Modded/Hacked App: Sago Mini World By Sago Mini
      Bundle ID: com.sagosago.Friends
      iTunes Store Link: https://itunes.apple.com/us/app/sago-mini-world/id874425722?mt=8&uo=4&at=1010lce4



      Hack Features:
      - PREMIUM


      Hack Download Link: https://iosgods.com/topic/77893-arm64-sago-mini-world-modded-v31-1/


      Credits:
      - @Laxus
        • Informative
      • 206 replies
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines