ida+debugserver真机调试ios app

1.xcode随便新建一个工程,在真机上跑一遍。这样/Developer/usr/bin 下就会有debugserver。
2.sftp把debugserver拉回本地,在同目录下新建plist文件entitlements.plist,内容如下:

3.然后给debugserver重签名

 
4.传回真机/usr/bin/debugserver.
5.brew install usbmuxd,把iphone端口映射到本地 iproxy 1234 1234
6.在ida的debug设置里debugger -> debgger options ->set specific options去掉Launch debugserver automatically
7.启动/usr/bin/debugserver *:1234
8.ida里开始调试,输入ip和端口号1234

ios砸壳

1.sftp往手机里传以下文件:

cycript(解压)

dumpdecrypted.dylib(下回来源码直接make编译)

2.ps -e找到目标进程x

3.cycript -p x

4.[[NSFileManager defaultManager] URLsForDirectory:NSDocumentDirectory
inDomains:NSUserDomainMask][0]
获取目标app的附件目录,然后把dumpdecrypted.dylib 传到这个附件目录,然后ctrl+D退出cyc
5.su mobile切用户(重要)
6.进入附件目录,DYLD_INSERT_LIBRARIES=dumpdecrypted.dylib /var/mobile/Containers/Bundle/
Application/xxxx/xxxx(执行文件路径)
mach-o decryption dumper

DISCLAIMER: This tool is only meant for security research purposes, not for application crackers.

[+] detected 64bit ARM binary in memory.
[+] offset to cryptid found: @0x100028cf8(from 0x100028000) = cf8
[+] Found encrypted data at address 00004000 of length 59457536 bytes – type 1.
[+] Opening /private/var/containers/Bundle/Application/176519AE-E905-4E0F-A718-3C7B1B96A6E3/WeChat.app/WeChat for reading.
[+] Reading header
[+] Detecting header type
[+] Executable is a plain MACH-O image
[+] Opening WeChat.decrypted for writing.
[+] Copying the not encrypted start of the file
[+] Dumping the decrypted data into the file
[+] Copying the not encrypted remainder of the file
[+] Setting the LC_ENCRYPTION_INFO->cryptid to 0 at offset cf8
[+] Closing original file
[+] Closing dump file

导出文件名:xxxx.decrypted

VM报错”找不到可以连接的有效对等进程”的解决方案

两种原因:

1.驱动被gatekeeper拦截,在设置里允许就行

2.不明原因驱动无法加载,具体表现为VM自带的4个驱动中某个或多个无法正常加载,可以通过kextstat |grep vm查看,正常请款下加载的4个驱动是:

184 1 0xffffff7f85fad000 0x11000 0x11000 com.vmware.kext.vmci (90.8.1) F673BA9E-4370-3867-996E-CA6615DFDE0A <12 5 4 3 1>
185 0 0xffffff7f85fbe000 0x16000 0x16000 com.vmware.kext.vmnet (0752.01.54) 9EDDE1C1-80D8-3154-95A1-25F70585272E <184 5 4 3 1>
186 0 0xffffff7f85fd4000 0x12000 0x12000 com.vmware.kext.vmx86 (0752.01.54) F20CC4A3-BFB5-365B-AEB8-84796FAA26F4 <7 5 4 3 1>
187 0 0xffffff7f85fe6000 0x6000 0x6000 com.vmware.kext.vmioplug.17.1.3 (17.1.3) 4E465B8F-BBF2-3877-BB4B-17398E62310C <53 5 4 3 1>

如果有起不来的,可以写成自启动脚本,在开机后自动把驱动先加载了

保存到/Library/LaunchDaemons,然后