Jump to content

9 posts in this topic

Recommended Posts

Posted

As I said in my first post, pretty new to decompiling and the like, but a long time coder and I pick stuff up quickly. So please excuse any noobishness or ignorance.

 

I'm trying to reverse engineer an app on iOS. Its been one hell of a process getting this far. After hitting many walls, I picked up a refurb macbook air yesterday, as most of the walls I hit seemed to be able to be bypassed by using a mac for the rest of the work.

 

Made it farther than ever before last night - got a watchpoint to break on a known memory location! Yes! Next step, disassemble the code there, find out whats going on, and how to hack/patch it.

 

Brief setup:

App running on ipod 6th gen (only device I have that wasnt on iOS 9.1+ already, ie: jailbreakable) iOS 9.0.2. debugserver from Xcode 7 running on it. Debugserver attached to a cracked, thinned armv7 binary, which I had to first load into gdb to patch out the ptrace anti-debug crap (start gdb, break ptrace, set $r0=-1, continue, disconnect - side note, while I wait for help here I'm gonna try patching that out in the binary itself to skip this step in the future). Remote lldb session running from command line on macbook air.

 

So, I find the location of the code where it's modifying the memory. I then do a disassemble --frame, and it spits out code that looks weird.

 

vsub.f32 d18, d18, d22

movt r1, #0xf767

adcs r0, r1

 

A lot of that doesnt look familiar at all... I go to the same location in my disassembled copy of the same binary in IDA, and the code is totally different. First of all, I have zero lines that have more than 2 "arguments" to it, it's always an instruction then 2 arguments. So the vsub.f32 with the 3 arguments is odd. Second, nowhere in that area of code do I see a vsub.f32 or an adcs anywhere.

 

So I check the starting address for the function, and its 3BEB78 in the lldb output, but the function at the address in IDA starts at 3BEB44.

 

So I think I'm debugging the wrong binary, so I transfer it from the ipod again, and reload it. No change.

 

I think that because its a 32 bit binary on a 64 bit device, maybe I need to open it in IDA differently. I change the arm type a few times, the output changes, but none match. I try IDA64, nothing.

 

I then remember a bug I had in lldb where I tried to load the symbols from the binary I moved over locally (it complained some error, so I stopped doing it). I re-transferred the binary and tried again. Same error. So I do a target info, and I see something weird.

Target #0: /path/appname { arch=armv7s-apple-ios, platform=remote-ios, pid=40071, state=stopped }

Target #1: /home/me/appname { arch=armv7-apple-ios, platform=remote-ios }

 

The local copy of the binary is listed as armv7 - which is confirmed on the ipod itself via lipo -detailed_info:

 
iPod-touch:~ root# lipo -detailed_info /path/appname
Fat header in: /path/appname
fat_magic 0xcafebabe
nfat_arch 1
architecture armv7
    cputype CPU_TYPE_ARM
    cpusubtype CPU_SUBTYPE_ARM_V7
    offset 16384
    size 13224544
    align 2^14 (16384)
 
But the REMOTE running copy is reporting as armv7s
 
I think that may be changing how my app is being decompiled in lldb.
 
So I google and I see mention of rebasing the program in IDA, by finding the base address with a info proc map in gdb. Failure - my gdb doesn't have that. I have no /proc directory on the ipod. I try procexp and it gives me a base of 0d4000 (I think, the output is odd) and when I go to rebase it, IDA says the base is 0x4000, so its close, so, maybe? I rebase, but no, it's now tottally wrong.
 
I'm at a loss what to do next. Googling how to find the memory map in lldb isnt coming up with anything. I see no options to specify the arch when using debugserver (since I read thats what reports the arch to the client). Cant see how to set it manually in the client.
 
Anyone? I'm dying here. Thanks.
 
Posted

Did you get the correct address from IGG/GP?

Also the LLDB address isn't always the hackable function look around it

and you can breakpoint the function to see if it correct or not ^_^

Posted

Yes I got the address from iGG, and I confirmed that it's right. Dumping the memory at that location, after I change the data in-app dumps the new data.

 

But regardless, when I disassemble the code around the address in the frame that lldb tells me is what cause the memory to change, the same code in IDA looks different. Thats my problem. Either lldb is disassembling it wrong (because it thinks it's armv7s instead of armv7) or IDA is disassembling it wrong, having the wrong offsets.

 

Thats the issue, not that I cannot find the code.


Hmm it seems my issue may be due to ASLR. Googling...

Posted

Yes I got the address from iGG, and I confirmed that it's right. Dumping the memory at that location, after I change the data in-app dumps the new data.

 

But regardless, when I disassemble the code around the address in the frame that lldb tells me is what cause the memory to change, the same code in IDA looks different. Thats my problem. Either lldb is disassembling it wrong (because it thinks it's armv7s instead of armv7) or IDA is disassembling it wrong, having the wrong offsets.

 

Thats the issue, not that I cannot find the code.

Hmm it seems my issue may be due to ASLR. Googling...

if it the ASLR then you can remove it easily also is your binary cracked? 

because the cracking tools normally remove the ASLR

also thin your binary before using IGG to know the address if you didn't before

Thats the issue. The next one is when I disable ASLR the app won't run anymore. This is a damn nightmare! :)

sign the binary and make the permissions 777 ^_^

also the binary need to be cracked before use it in IDA also thin it ^_^

Posted (edited)

Hey infernusdoleo , how you did a rebase in IDA Pro? I have the same problem on my Reversed App, wrong offset and wrong llldb address please if you have time write me back,

 

Thanks

 

ELREYS

Updated by ELREYS
Posted

No matter which method I use to remove ASLR it crashes when I run it. I'm just connecting, checking the ASLR offset, then rebasing IDA with that value. Annoying when I need to restart the app, but it works.

Hey bud,

 

Since Remove ASLR isn't working for you, maybe you should give this a go? The tool, linked below, can thin binaries, remove ASLR, class dump, strings, and symbols.

 

https://iosgods.com/topic/20338-binary-tools-online-strings-symbols-binary-thinning-class-dump-and-remove-aslrpie/

Posted

No matter which method I use to remove ASLR it crashes when I run it. I'm just connecting, checking the ASLR offset, then rebasing IDA with that value. Annoying when I need to restart the app, but it works.

  

Hey infernusdoleo , how you did a rebase in IDA Pro? I have the same problem on my Reversed App, wrong offset and wrong llldb address please if you have time write me back,

Thanks

ELREYS

^^

 

You can also defeat ASLR without removing it: https://iosgods.com/topic/19378-how-to-defeatremove-aslr-on-ios-9-armv7-and-arm64-devices/

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Our picks

    • CookieRun: Kingdom v7.0.001 Jailed Cheats +3
      Modded/Hacked App: CookieRun: Kingdom By Devsisters Corp.
      Bundle ID: com.devsisters.ck
      App Store Link: https://apps.apple.com/us/app/cookierun-kingdom/id1509450845?uo=4

       

      📌 Mod Requirements

      - Non-Jailbroken/Jailed or Jailbroken iPhone or iPad.
      - Sideloadly or alternatives.
      - Computer running Windows/macOS/Linux with iTunes installed.

       

      🤩 Hack Features

      - Multiply Attack
      - Multiply Defense
      - No Skills Cooldown
       

      ⬇️ iOS Hack Download IPA Link: https://iosgods.com/topic/201150-cookierun-kingdom-v610001-jailed-cheats-3/
        • Informative
        • Agree
        • Like
      • 90 replies
    • War Inc: Rising v0.8.2 Jailed Cheats +3
      Modded/Hacked App: War Inc: Rising By SamShui Corporation
      Bundle ID: com.i89trillion.strategy.rising
      App Store Link: https://apps.apple.com/us/app/war-inc-rising/id6747767390?uo=4

       

      📌 Mod Requirements

      - Non-Jailbroken/Jailed or Jailbroken iPhone or iPad.
      - Sideloadly or alternatives.
      - Computer running Windows/macOS/Linux with iTunes installed.

       

      🤩 Hack Features

      - God Mode
      - One Hit Kill
      - Auto Win

       

      ⬇️ iOS Hack Download IPA Link: https://iosgods.com/topic/202371-war-inc-rising-v080-jailed-cheats-3/
      • 14 replies
    • Angry Birds Dream Blast Cheats v1.99.1 +3
      Modded/Hacked App: Angry Birds Dream Blast By Rovio Entertainment Oyj
      Bundle ID: com.rovio.dream
      iTunes Store Link: https://apps.apple.com/us/app/angry-birds-dream-blast/id1432579280?uo=4


      Hack Features:
      - Infinite Moves
      - Infinite Lives
      - Infinite Boosters


      Non-Jailbroken & No Jailbreak required hack(s): https://iosgods.com/topic/149687-angry-birds-dream-blast-v1340-jailed-cheats-3/


      iOS Hack Download Link: https://iosgods.com/topic/149684-angry-birds-dream-blast-cheats-all-versions-3/
        • Agree
        • Winner
        • Like
      • 117 replies
    • Toy Blast Cheats (Auto Update) +6
      Modded/Hacked App: Toy Blast By Peak Games
      Bundle ID: net.peakgames.amy
      iTunes Store Link: https://itunes.apple.com/us/app/toy-blast/id890378044?mt=8&uo=4&at=1010lce4



      Hack Features:
      - Infinite Hearts
      - Infinite Coins
      - Infinite Boosters
      - Never Lose
      - High Score
      - Always 3 Stars


      Non-Jailbroken & No Jailbreak required hack(s): https://iosgods.com/topic/73056-arm64-toy-blast-v5431-jailed-cheats-3/


      Hack Download Link: https://iosgods.com/topic/73037-arm64-toy-blast-cheats-v5475-6/



      Credits:
      - @Laxus
      • 641 replies
    • PewDiePie's Tuber Simulator Cheats (Auto Update) +3
      Modded/Hacked App: PewDiePie's Tuber Simulator By Outerminds Inc.
      Bundle ID: com.outerminds.tubular
      iTunes Store Link: https://apps.apple.com/us/app/pewdiepies-tuber-simulator/id1093190533?uo=4

       

      📌 Mod Requirements

      - Jailbroken iPhone or iPad.
      - iGameGod / Filza / iMazing.
      - Cydia Substrate, ElleKit, Substitute or libhooker depending on your jailbreak (from Sileo, Cydia or Zebra).

       

      🤩 Hack Features

      - Infinite Subscriber
      - Infinite Views
      - Infinite Bux

      NOTE: Please complete tutorial first before enabling the hacks otherwise it won't work

      NOTe 2: Please make a youtube video to get some views first (without hack) then before enable infinite views

       

      Non-Jailbroken Hack: https://iosgods.com/topic/86411-pewdiepies-tuber-simulator-v2450-jailed-cheats-3/

       

      ⬇️ iOS Hack Download Link: https://iosgods.com/topic/86366-pewdiepies-tuber-simulator-cheats-v2460-3/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 1,184 replies
    • FR Legends Cheats v0.4.2 +3
      Modded/Hacked App: FR LEGENDS By FENG LI
      Bundle ID: com.fengiiley.frlegends
      iTunes Store Link: https://itunes.apple.com/us/app/fr-legends/id1435740083?mt=8&uo=4&at=1010lce4


      Hack Features:
      - Custom Gold (Enter the value you want and enable the switch)
      - Custom Cash
      - Infinite Layer


      Non-Jailbroken & No Jailbreak required hack(s): https://iosgods.com/topic/79729-arm64-fr-legends-v027-jailed-cheats-3/


      Hack Download Link: https://iosgods.com/topic/79816-arm64-fr-legends-cheats-v029-3/
        • Agree
        • Haha
        • Winner
        • Like
      • 641 replies
    • Rick and Morty: Pocket Mortys v2.41.0 Jailed Cheats +1
      Modded/Hacked App: Rick and Morty: Pocket Mortys by Turner Broadcasting System, Inc.
      Bundle ID: com.turner.pocketmorties
      iTunes Store Link: https://itunes.apple.com/us/app/rick-and-morty-pocket-mortys/id992640880?mt=8&uo=4&at=1010lce4



      Hack Features:
      - Infinite Schmeckles
      - Infinite Coupons


      Hack Download Link: https://iosgods.com/topic/86695-arm64-rick-and-morty-pocket-mortys-v271-jailed-cheats-2/
        • Informative
        • Agree
        • Winner
        • Like
      • 453 replies
    • [ Push Hero: Idle RPG ] 푸시 히어로: 방치형 RPG 키우기 v0.40.12 Jailed Cheats +4
      Modded/Hacked App: 푸시 히어로: 방치형 RPG 키우기 By MalangGames Corp.
      Bundle ID: com.malang.store.finalidle
      App Store Link: https://apps.apple.com/kr/app/%ED%91%B8%EC%8B%9C-%ED%9E%88%EC%96%B4%EB%A1%9C-%EB%B0%A9%EC%B9%98%ED%98%95-rpg-%ED%82%A4%EC%9A%B0%EA%B8%B0/id6476646717?uo=4

       

      📌 Mod Requirements

      - Non-Jailbroken/Jailed or Jailbroken iPhone or iPad.
      - Sideloadly or alternatives.
      - Computer running Windows/macOS/Linux with iTunes installed.

       

      🤩 Hack Features

      - God Mode
      - Multiply Attack
      - Freeze Currencies
      - Premium
      - Support English

       

      Jailbroken Hack: https://iosgods.com/topic/204528-push-hero-idle-rpg-%ED%91%B8%EC%8B%9C-%ED%9E%88%EC%96%B4%EB%A1%9C-%EB%B0%A9%EC%B9%98%ED%98%95-rpg-%ED%82%A4%EC%9A%B0%EA%B8%B0-cheats-v04011-4/

       

      ⬇️ iOS Hack Download IPA Link: https://iosgods.com/topic/204527-push-hero-idle-rpg-%ED%91%B8%EC%8B%9C-%ED%9E%88%EC%96%B4%EB%A1%9C-%EB%B0%A9%EC%B9%98%ED%98%95-rpg-%ED%82%A4%EC%9A%B0%EA%B8%B0-v04011-jailed-cheats-4/
      • 3 replies
    • Love Eden: Chapters of Romance v2.0.2 +10++ Jailed Cheats [ Debug Menu ]
      Modded/Hacked App: Love Eden: Chapters of Romance By NODERNO LIMITED
      Bundle ID: com.noderno.loveeden
      App Store Link: https://apps.apple.com/us/app/love-eden-chapters-of-romance/id6471411677?uo=4

       


      🤩 Hack Features

      - Debug Menu -> Head over to your profile and then tap on Settings.
      • 7 replies
    • Grand War: Rome Strategy Games v1233 +5 Mods [ Damage & Defence ]
      Mod APK Game Name: Grand War: Rome Strategy Games By Joynow Studio
      Rooted Device: Not Required.
      Google Play Store Link: https://play.google.com/store/apps/details?id=com.rome.caesar.war.strategy.conqueror.games

       

      🤩 Hack Features

      - Damage Multiplier
      - Defence Multiplier
      - Unlimited Silver
      - Unlimited Gold
      - Unlimited Medals
      • 1 reply
    • Love Eden: Interactive Stories v2.0.2 +10++ Mods [ Debug Menu ]
      Mod APK Game Name: Love Eden: Interactive Stories By Noderno Limited
      Rooted Device: Not Required.
      Google Play Store Link: https://play.google.com/store/apps/details?id=com.noderno.loveeden

       

      🤩 Hack Features

      - Debug Menu -> Head over to your profile and then tap on Settings. 
      • 1 reply
    • Grand War: Rome Strategy Games v2.4.1 +5 Jailed Cheats [ Damage & Defence ]
      Modded/Hacked App: Grand War: Rome Strategy Games By HangZhouCaiLingTechnology.Co., Limited
      Bundle ID: com.rome.caesar.war.strategy.conqueror.games.2021
      iTunes Store Link: https://apps.apple.com/us/app/grand-war-rome-strategy-games/id1593989305?uo=4

       


      🤩 Hack Features

      - Damage Multiplier
      - Defence Multiplier
      - Unlimited Silver
      - Unlimited Gold
      - Unlimited Medals
        • Agree
        • Like
      • 45 replies
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines