Jump to content

20 posts in this topic

Recommended Posts

Posted (edited)

So I'm hacking coins in Hungry Shark Evolution and LLDB landed me at the highlighted MOVE (in the pic linked below). So I look around and I found LDR R0, [R0] (thinking that R0 is Coins and R0 is loading into R0! (Confused, sorry bout that). I modified that to MOV R0, R7 (in hex it's 381C) and put binary back into device iPhone 6 iOS 9.0.2! I open game and that coins aren't infinite! Why is this??

 

I used the tut of bypassing ASLR but Ida didn't show the outcome (what I'm supposed to search in Ida) of subtracting ASLR from address LLDB gave me!

 

So what the hell do I do?. I'm a beginner at SUB_X and I already know how to do MSHOOK and modify plist and also hex edit and also Ida functions (no subx)! (I know. I get it. so much for a 14 year old) I need help with sub X! Please!

 

What do I do/what do I modify??

 

Picture: http://imgur.com/lG7A91p

Updated by Asianplus
Posted

For armv7 binary i would recommend removing aslr because i tried it once without aslr removed and got an offset

 

Thrn i tried it again with aslr, and did the trick to bypass aslr with lldb and got a different offset :/

 

 

Thr aslr trick does work with lldb for arm64 however

Posted (edited)

For armv7 binary i would recommend removing aslr because i tried it once without aslr removed and got an offset

Thrn i tried it again with aslr, and did the trick to bypass aslr with lldb and got a different offset :/

Thr aslr trick does work with lldb for arm64 however

But it crashes the game when putting aslr removed thinned binary in the games .app folder. So I dunno what to do what aslr removed crashes the game

 

So therefore I can't search values because the damn game crashes

Updated by Asianplus
Posted

So post again a pic of ida of the offset u got from lldb and no aslr

 

 

Use armconverter.com

 

And once u put the binary with aslr back to ur device, sign it first

 

ldid -s BinaryName

 

 

And make sure permissions are set correctly then replace the bin then rehack it

Posted

So post again a pic of ida of the offset u got from lldb and no aslr

Use armconverter.com

And once u put the binary with aslr back to ur device, sign it first

ldid -s BinaryName

And make sure permissions are set correctly then replace the bin then rehack it

Did that and still no work!

Posted

Tried it just now and doesn't work for me

It works perfectly for me :/ you sure you did everything right?

 

There are also strings you can use to hack with

I dont know the exact name but they are something like

SetSessionStandardCurrency

SetSessionPremiumCurrency

Posted

It works perfectly for me :/ you sure you did everything right?

There are also strings you can use to hack with

I dont know the exact name but they are something like

SetSessionStandardCurrency

SetSessionPremiumCurrency

I did everything right! Nothing ever fricking works for me!

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines