Jump to content

3 posts in this topic

Recommended Posts

Posted (edited)

Actually I'm reverse engineering the jailbreak detection of an app.

The problem is that on the "IDA view-A" tab when I select the instruction (ex. MOV W20, #1) and I switch over "Hex View-1" tab it gives me these HEXs: F4 03 00 32 (based on that instruction);

Now based on what I know if I want to modify the instruction to be something like (MOV W20, #0) I should go over an ARM to HEX converter but even before doing that (by the way I use http://armconverter.com/) if I try to paste MOV W20, #1 over the site it should give me the same HEXs:  F4 03 00 32 that IDA prompt out but instead it gives me these HEXs: 34 00 80 52.

Anyone knows the issue?

Updated by Moltivie
Posted

Hey,

It should still work the same, no problem. :)

Posted
2 minutes ago, DiDA said:

Hey,

It should still work the same, no problem. :)

Thank you for the fast reply.

Based on what you've said, I can just modify

F4 03 00 32 (MOV W20, #1  -  HEXs that IDA gave me) 

with 14 00 80 52 (MOV W20, #0  -  HEXs that armconverter gave me)

Correct?

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines