Jump to content

Help with disabling _syscall


Go to solution Solved by Aswag1,

36 posts in this topic

Recommended Posts

  • Solution
Posted

Well after laying dormant for quite awhile, I thought I might add a couple of pointers....

 

It seems that for 64-bit devices, there are certain additional checks in the binary in most GameLoft games. Most notably, the addition of a __sysctl. What this call does is check whether the __syscall flag is checked. If it sees that it has been manipulated in some fashion (such as NOPing the BLX or NOP the MOV) it will immediately give a EXEC_BAD_ADDRESS error.

 

Now here are some of my findings to combat this...

 

I have seen that making any alterations in a binary patch have led to the game crashing once I attach to it in lldb. So, logically I just patch the memory of the game rather than make crude adjustments. It seems to work, though it is a pain in the ass and you have to keep stepping through the memory stack to make sure that all checks are thoroughly disabled. I had all the checks for Brothers In Arms 3 before, I am not sure if I have them still. I would like to help, but I'm not really into iOS hacking anymore so there's that. Hopefully one of the young bloods can help you out and resolve your problem.

Posted

Well after laying dormant for quite awhile, I thought I might add a couple of pointers....

 

It seems that for 64-bit devices, there are certain additional checks in the binary in most GameLoft games. Most notably, the addition of a __sysctl. What this call does is check whether the __syscall flag is checked. If it sees that it has been manipulated in some fashion (such as NOPing the BLX or NOP the MOV) it will immediately give a EXEC_BAD_ADDRESS error.

 

Now here are some of my findings to combat this...

 

I have seen that making any alterations in a binary patch have led to the game crashing once I attach to it in lldb. So, logically I just patch the memory of the game rather than make crude adjustments. It seems to work, though it is a pain in the ass and you have to keep stepping through the memory stack to make sure that all checks are thoroughly disabled. I had all the checks for Brothers In Arms 3 before, I am not sure if I have them still. I would like to help, but I'm not really into iOS hacking anymore so there's that. Hopefully one of the young bloods can help you out and resolve your problem.

 

Thank you for a great explanation. So basically, I cannot use my 5S to make hacks for Gameloft games (except for patching the memory, which would be temporary because the addresses would change every time) because it is 64-bit, but I can use a device that is not 64-bit, for example my old ipod touch 5g. So if I load up the binary from my iPod, I might be able to patch __syscall so that I can attach it to GDB?

Posted

Find the syscal method, and BX LR the first instruction.

That's right. If calls to the functions can easily be disabled, you could simply make the actual syscall function to return and do nothing. Can you post the disassembly for the syscall function?

Posted (edited)

@@Aswag1 yeah, it has been jailbroken four times and freezes regularly... i don't think i can use it, and out of curiosity, is android hacking easier than ios?

 

@@Gh0stByte i feel like if i BX LR the first instruction, it will crash because of what aswag1 said

 

@jx1992 i can post the disassembly here later, just not now, i'm going to a movie in 5 mins :p

Updated by Guest
Posted

@@jx1992 here are the things that i think are the _syscall function.

 

1.

 

__text:0000C5C8   sub_C5C8                                ; CODE XREF: -[sendInfoInterface IGPSendGameInfo:::::]+536p

__text:0000C5C8                 PUSH            {R7,LR}
__text:0000C5CA                 MOV             R7, SP
__text:0000C5CC                 SUB             SP, SP, #0x6C
__text:0000C5CE                 MOVW            R1, #(:lower16:(aLibraryMobiles - 0xC5DE)) ; "/Library/MobileSubstrate/MobileSubstrat"...
__text:0000C5D2                 MOV             R2, SP
__text:0000C5D4                 MOVT.W          R1, #(:upper16:(aLibraryMobiles - 0xC5DE)) ; "/Library/MobileSubstrate/MobileSubstrat"...
__text:0000C5D8                 MOVS            R0, #0xBC ; int
__text:0000C5DA                 ADD             R1, PC  ; "/Library/MobileSubstrate/MobileSubstrat"...
__text:0000C5DC                 BLX.W           _syscall
__text:0000C5E0                 CMP             R0, #0
__text:0000C5E2                 BEQ             loc_C66C
__text:0000C5E4                 MOVW            R1, #(:lower16:(aApplicationsCy - 0xC5F4)) ; "/Applications/Cydia.app"
__text:0000C5E8                 MOV             R2, SP
__text:0000C5EA                 MOVT.W          R1, #(:upper16:(aApplicationsCy - 0xC5F4)) ; "/Applications/Cydia.app"
__text:0000C5EE                 MOVS            R0, #0xBC ; int
__text:0000C5F0                 ADD             R1, PC  ; "/Applications/Cydia.app"
__text:0000C5F2                 BLX.W           _syscall
__text:0000C5F6                 CMP             R0, #0
__text:0000C5F8                 BEQ             loc_C66C
__text:0000C5FA                 MOVW            R1, #(:lower16:(aVarLibApt - 0xC60A)) ; "/var/lib/apt"
__text:0000C5FE                 MOV             R2, SP
__text:0000C600                 MOVT.W          R1, #(:upper16:(aVarLibApt - 0xC60A)) ; "/var/lib/apt"
__text:0000C604                 MOVS            R0, #0xBC ; int
__text:0000C606                 ADD             R1, PC  ; "/var/lib/apt"
__text:0000C608                 BLX.W           _syscall
__text:0000C60C                 CMP             R0, #0
__text:0000C60E                 BEQ             loc_C66C
__text:0000C610                 MOVW            R1, #(:lower16:(aVarLibCydia - 0xC620)) ; "/var/lib/cydia"
__text:0000C614                 MOV             R2, SP
__text:0000C616                 MOVT.W          R1, #(:upper16:(aVarLibCydia - 0xC620)) ; "/var/lib/cydia"
__text:0000C61A                 MOVS            R0, #0xBC ; int
__text:0000C61C                 ADD             R1, PC  ; "/var/lib/cydia"
__text:0000C61E                 BLX.W           _syscall
__text:0000C622                 CMP             R0, #0
__text:0000C624                 BEQ             loc_C66C
__text:0000C626                 MOVW            R1, #(:lower16:(aVarTmpCydia_lo - 0xC636)) ; "/var/tmp/cydia.log"
__text:0000C62A                 MOV             R2, SP
__text:0000C62C                 MOVT.W          R1, #(:upper16:(aVarTmpCydia_lo - 0xC636)) ; "/var/tmp/cydia.log"
__text:0000C630                 MOVS            R0, #0xBC ; int
__text:0000C632                 ADD             R1, PC  ; "/var/tmp/cydia.log"
__text:0000C634                 BLX.W           _syscall
__text:0000C638                 CMP             R0, #0
__text:0000C63A                 BEQ             loc_C66C
__text:0000C63C                 MOVW            R1, #(:lower16:(aEtcApt - 0xC64C)) ; "/etc/apt"
__text:0000C640                 MOV             R2, SP
__text:0000C642                 MOVT.W          R1, #(:upper16:(aEtcApt - 0xC64C)) ; "/etc/apt"
__text:0000C646                 MOVS            R0, #0xBC ; int
__text:0000C648                 ADD             R1, PC  ; "/etc/apt"
__text:0000C64A                 BLX.W           _syscall
__text:0000C64E                 CMP             R0, #0
__text:0000C650                 BEQ             loc_C66C
__text:0000C652                 MOVS            R0, #2  ; int
__text:0000C654                 BLX.W           _syscall
__text:0000C658                 MOV             R1, R0
__text:0000C65A                 MOVS            R0, #0  ; int
__text:0000C65C                 CMP             R1, #0
__text:0000C65E                 BEQ             loc_C672
__text:0000C660                 CMP.W           R1, #0xFFFFFFFF
__text:0000C664                 IT GT
__text:0000C666                 MOVGT           R0, #1
__text:0000C668                 ADD             SP, SP, #0x6C
__text:0000C66A                 POP             {R7,PC}
__text:0000C66C ; ---------------------------------------------------------------------------
__text:0000C66C
__text:0000C66C loc_C66C                                ; CODE XREF: sub_C5C8+1Aj
__text:0000C66C                                         ; sub_C5C8+30j ...
__text:0000C66C                 MOVS            R0, #1
__text:0000C66E                 ADD             SP, SP, #0x6C
__text:0000C670                 POP             {R7,PC}
__text:0000C672 ; ---------------------------------------------------------------------------
__text:0000C672
__text:0000C672 loc_C672                                ; CODE XREF: sub_C5C8+96j
__text:0000C672                 BLX.W           _exit
__text:0000C676                 NOP
__text:0000C676 ; End of function sub_C5C8

 

2.

 

__picsymbolstub4:0095AEE8 _syscall                                ; CODE XREF: sub_C5C8+14p
__picsymbolstub4:0095AEE8                                         ; sub_C5C8+2Ap ...
__picsymbolstub4:0095AEE8                 LDR             R12, =(_syscall_ptr - 0x95AEF4)
__picsymbolstub4:0095AEEC                 ADD             R12, PC, R12 ; _syscall_ptr
__picsymbolstub4:0095AEF0                 LDR             PC, [R12] ; __imp__syscall
__picsymbolstub4:0095AEF0 ; End of function _syscall
 
Again, I'm not used to doing all of this just to debug a game. I was surprised that there where almost no answers from when I first searched this, or no guide on any website. I am also surprised that there are so many people that are willing to help me, it really means alot :)
Posted

@@Shmoo419

 

In the disassembly posted on page 1, the syscall is made to ptrace with the argument "PT_DENY_ATTACH".

In linux, this would be used to deny debuggers from attaching to the current process (in this case, Nova 3).

 

Since the disassembly shows that the program doesn't check for the return value of the ptrace syscall, what you can do is one of these 2.

 

1) Set r1 to -1

 

Because -1 is not a valid ptrace request argument, the ptrace syscall will return with an error and the call will not succeed.

 

2) Nop the branch to syscall

 

This simply stops the function from making a syscall. Simple as that.

 

From what I can infer, I suppose you are trying to attach a debugger to the Nova 3 app. You can try the above 2 methods to see if you can get your debugger to attach.

 

For more details you can reference this site : http://www.coredump.gr/articles/ios-anti-debugging-protections-part-1/

 

Good luck

Posted

@@jx1992 I know that PT_DENY_ATTACH keeps the debugger from attaching, but I never tried -1, but instead anything other than 31 (0x1F) or I NOP'ed it. And I usually stay away from NOP'ing branches because it usually results in a crash (for me at least), but I'll give it a go. That website was really useful, too.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Our picks

    • Margonem Adventures v2.2.3 [+3 Jailed Cheats]
      Modded/Hacked App: Margonem Adventures By GARMORY sp. z o.o. sp. k.
      Bundle ID: pl.Garmory.MargonemAdventures
      iTunes Store Link: https://apps.apple.com/us/app/margonem-adventures/id6444410609?uo=4

       

      🤩 Hack Features

      - Enemy Can't Move
      - Enemy Can't Attack
      - Unlimited Mana
      • 21 replies
    • Margonem Adventures v2.2.3 [+3 Cheats]
      Modded/Hacked App: Margonem Adventures By GARMORY sp. z o.o. sp. k.
      Bundle ID: pl.Garmory.MargonemAdventures
      iTunes Store Link: https://apps.apple.com/us/app/margonem-adventures/id6444410609?uo=4



      🤩 Hack Features

      - Enemy Can't Move
      - Enemy Can't Attack
      - Unlimited Mana
      • 14 replies
    • Guns Arena: PvP Shooting Games v1.32.47 [+5 Cheats]
      Modded/Hacked App: Guns Arena: PvP Shooting Games By VIVA GAMES S.L.
      Bundle ID: com.vivastudios.gunsatdawn.shooter
      iTunes Store Link: https://apps.apple.com/us/app/guns-arena-pvp-shooting-games/id1613912708?uo=4

       

      🚀 Hack Features

      - [VIP] Enemy Can't Attack

      - [VIP] High Damage / OHK

      - [VIP] Enemy Can't Attack Battle Royale

      - [VIP] Always can Enter Battle Royale (Enable go Royale tab and click get dawn pass)

      - Inf Coins (Can't use on Characters, Weapons and Dawnpass)

      - Inf Gold (Can't use on Characters, Weapons and Dawnpass)


      🍏 For Non-Jailbroken & No Jailbreak required hacks: https://iosgods.com/forum/79-no-jailbreak-section/
      🤖 Modded Android APK(s): https://iosgods.com/forum/68-android-section/
      • 53 replies
    • Guns Arena: PvP Shooting Games v1.32.47 [+5 Jailed Cheats]
      Modded/Hacked App: Guns Arena: PvP Shooting Games By VIVA GAMES S.L.
      Bundle ID: com.vivastudios.gunsatdawn.shooter
      iTunes Store Link: https://apps.apple.com/us/app/guns-arena-pvp-shooting-games/id1613912708?uo=4
       

      🚀 Hack Features

      - [VIP] Enemy Can't Attack

      - [VIP] High Damage / OHK

      - [VIP] Enemy Can't Attack Battle Royale

      - [VIP] Always can Enter Battle Royale (Enable go Royale tab and click get dawn pass)

      - Inf Coins (Can't use on Characters, Weapons and Dawnpass)

      - Inf Gold (Can't use on Characters, Weapons and Dawnpass)


      🍏 Jailbreak iOS hacks: https://iosgods.com/forum/5-game-cheats-hack-requests/
      🤖 Modded Android APKs: https://iosgods.com/forum/68-android-section/
      • 45 replies
    • Mafia Empire: Crime Tycoon v1.12.2 Cheat Menu [+10 Cheats]
      Modded/Hacked App: Mafia Empire: Crime Tycoon By PINPIN TEAM SARL
      Bundle ID: mafia.empire.tycoon
      App Store Link: https://apps.apple.com/us/app/mafia-empire-crime-tycoon/id6738845139?uo=4



      🤩 Hack Features

      - Cheat Menu (Enable and Cheat Menu Will Appear)
      • 15 replies
    • Mafia Empire: Crime Tycoon v1.12.2 Cheat Menu [+10 Jailed Cheats]
      Modded/Hacked App: Mafia Empire: Crime Tycoon By PINPIN TEAM SARL
      Bundle ID: mafia.empire.tycoon
      App Store Link: https://apps.apple.com/us/app/mafia-empire-crime-tycoon/id6738845139?uo=4



      🤩 Hack Features

      - Cheat Menu (Enable and Cheat Menu Will Appear)
      • 16 replies
    • Knights of Pen and Paper 3 v1.5.11 [+5 Cheats]
      Modded/Hacked App: Knights of Pen and Paper 3 By Northica Oy
      Bundle ID: com.northicagames.kopp3
      App Store Link: https://apps.apple.com/us/app/knights-of-pen-and-paper-3/id6462194230?uo=4



      🤩 Hack Features

      - High Gold Gain (Enable and Win Fight)
      - Always Can Claim Achievements
      - Auto Win (Enable inside battle)
      - Level Up Characters (Enable and your heroes levels up)
      - Max Level Equipments (Enable and all equipments will be max level)

      • 6 replies
    • Knights of Pen and Paper 3 v1.5.11 [+5 Jailed Cheats]
      Modded/Hacked App: Knights of Pen and Paper 3 By Northica Oy
      Bundle ID: com.northicagames.kopp3
      App Store Link: https://apps.apple.com/us/app/knights-of-pen-and-paper-3/id6462194230?uo=4



      🤩 Hack Features

      - High Gold Gain (Enable and Win Fight)
      - Always Can Claim Achievements
      - Auto Win (Enable inside battle)
      - Level Up Characters (Enable and your heroes levels up)
      - Max Level Equipments (Enable and all equipments will be max level)

      • 10 replies
    • Neon Wings v20.1.51 [+4 Cheats]
      Modded/Hacked App: Neon Wings By Voodoo
      Bundle ID: games.omicron.neonflight
      App Store Link: https://apps.apple.com/us/app/neon-wings/id6741190842?uo=4



      🤩 Hack Features

      - Never Die
      - Unlimited Currency
      - Always Can Level Modules
      - Free Upgrades (Enable inside upgrade menu) 
      • 15 replies
    • Neon Wings v20.1.51 [+4 Jailed Cheats]
      Modded/Hacked App: Neon Wings By Voodoo
      Bundle ID: games.omicron.neonflight
      App Store Link: https://apps.apple.com/us/app/neon-wings/id6741190842?uo=4



      🤩 Hack Features

      - Never Die
      - Unlimited Currency
      - Always Can Level Modules
      - Free Upgrades (Enable inside upgrade menu) 
      • 9 replies
    • Gear Truck! v1.0.25 [+3 Jailed Cheats]
      Modded/Hacked App: Gear Truck! By treeplla Inc.
      Bundle ID: com.tree.hybrid.geartank
      App Store Link: https://apps.apple.com/us/app/gear-truck/id6747216965?uo=4



      🤩 Hack Features

      - Never Die
      - High Wheel Speed Gain
      - One Hit Kill
      • 7 replies
    • Gear Truck! v1.0.25 [+3 Cheats]
      Modded/Hacked App: Gear Truck! By treeplla Inc.
      Bundle ID: com.tree.hybrid.geartank
      App Store Link: https://apps.apple.com/us/app/gear-truck/id6747216965?uo=4



      🤩 Hack Features

      - Never Die
      - High Wheel Speed Gain
      - One Hit Kill
       
      • 6 replies
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines