![]() Of course, Reverse Engineering can't be resumed in a 15 minute video, but we have to start from something smaller so that you can understand what it represents.Īs an example, I demoed how you can use reverse engineering to disassemble the Apple System Restore (ASR) app and how to find the instruction you need to patch using Hopper Disassembler v3 on OS X. We're going to also have videos targeting IDA Pro and Windows. In the next video we're going to enter deeper in the iOS Reverse Engineering by analyzing and modifying real applications, I will also explain you the iOS System Hierarchy and we're also going to cover the components like Daemons, Dylibs (Dynamic Link Libraries), Frameworks and Bundles. We're also going to do carry out a restore with a patched ASR (that we're going to make together in the video). Hopper Disassembler, the reverse engineering tool that lets you disassemble, decompile and debug your applications. Please keep in mind that this video is made for absolute beginners. Hopper v4 for Mac requires macOS 10.9 or higher. If you like this video format and if you want to know more about iOS Reverse Engineering, give a like to this video and tell me in the comments section □ Hopper v3 for Linux requires Ubuntu 14.04, Arch Linux, Fedora 20 or higher, and a 64 bits processor. If you have questions, ask them down bellow □ Patching an ipa (iPhone app) using Hopper Disassembler. ![]() I have learned in the past to patch some iOS apps to bypass jailbreak detection. Today, I decided to change the UI elements in the Spotify app on iOS Platform (ios 11). ipa file of Spotify and opened the executable using Hopper Disassembler v3. ![]() Tags: Apple ARM Assembly ASR Patching Cydia F.C.E.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |