Microsoft Word - iOSAppReverseEngineering.docx
Figure 10- 88 Tracing the NSArray R2 comes from R6, and R6 comes from [SP, #0xA8+var_80]. The same pattern has reappeared, so as ...
Figure 10- 91 Trace IMHandle You’ll find it is indeed an addObject:, and by its context, you’ll see its argument comes from imHa ...
Figure 10- 92 Inspect cross references Figure 10- 93 [CKTranscriptController sendMessage:] OK, let’s figure out what’s [CKConver ...
Figure 10- 94 IMServiceImpl.h It inherits from IMService, and IMService.h is shown in figure 10-95. Figure 10- 95 IMService.h [I ...
Figure 10- 96 IMMessage.h There’re lots of class methods, among which “instantMessageWithText:flags:” gets our attention. Seems ...
Figure 10- 97 [NSAttributedString string] Let’s test “instantMessageWithText:flags:” with an NSAttributedString object: cy# attr ...
Figure 10- 98 iMessage delivered 10.4 Result Interpretation Compared to previous practices, the reverse engineering methodology ...
know a certain private class better. In this chapter, when we came across some suspicious variables, we didn’t strictly analyze ...
role of a post office; its building materials, office equipments and clerks are all from ChatKit, while IMCore is the postman. W ...
Done. 10.5.2 Compose iOSREMadridMessenger.h We’ve made use of multiple private classes and methods in previous sections, so we n ...
if ([address rangeOfString:@"@"].location != NSNotFound) formattedAddress = [@"mailto:" stringByAppendingString:address]; else f ...
10.5.5 Test with Cycript Compile and install the tweak, then ssh into iOS and execute the following commands: FunMaker-5:~ root# ...
an IMChat or CKConversation object; IMChatRegistry is responsible for managing all IMChats; an iMessage is an IMMessage or CKCom ...
Jailbreaking for Developers, An Overview Much has been said about Apple’s closed approach to selling devices and running an app ...
functions are more difficult. No information about what the parameters or data structures are baked into the binaries, only the ...
straightforward to replace the implementations of existing methods with new ones that add new functionality, suppress the origin ...
Evading the Sandbox As a security measure and to keep apps on the device from sharing data or interfering with each other, iOS i ...
single project that needs updating as the rules change. Ryan Petrich Code Wrangler, Father of Activator ...
Tweaking is the new-age hacking I am not a prolific programmer by any means. I have a programmer’s mind, and I have proven in my ...
careful targeting of methods and functions. It’ s a lot of fun to discover how things work, and tweak making is the embodiment o ...
«
14
15
16
17
18
19
20
21
22
23
»
Free download pdf