iOS逆向之Clutch砸壳
来源:互联网 发布:如何使用海关数据 编辑:程序博客网 时间:2024/05/16 10:58
https://github.com/KJCracks/Clutch/releases,去这个网站下载Clutch的Release包,然后通过Scp命令copy到iPhone上。
dev-aozhimindeMacBook-Pro:~ dev-aozhimin$ scp ~/Downloads/Clutch.2.0/Clutch root@172.16.25.116:/usr/bin
root@172.16.25.116's password:
root@172.16.25.116's password:
Clutch 100% 1156KB 1.1MB/s 00:00
clutch的参数
dev-aozhiminde-iPhone:/usr/bin root# Clutch
Usage: Clutch [OPTIONS]
-b --binary-dump <value> Only dump binary files from specified bundleID
-d --dump <value> Dump specified bundleID into .ipa file
-i --print-installed Print installed applications
--clean Clean /var/tmp/clutch directory
--version Display version and exit
-? --help Display this help and exit
Usage: Clutch [OPTIONS]
-b --binary-dump <value> Only dump binary files from specified bundleID
-d --dump <value> Dump specified bundleID into .ipa file
-i --print-installed Print installed applications
--clean Clean /var/tmp/clutch directory
--version Display version and exit
-? --help Display this help and exit
显示已经装了的app
dev-aozhiminde-iPhone:/usr/bin root# Clutch --print-installed
Installed apps:
1: 微信 <com.tencent.xin>
2: QQ <com.tencent.mqq>
3: 大众点评 <com.dianping.dpscope>
4: 支付宝 <com.alipay.iphoneclient>
5: 饿了么 <me.ele.ios.eleme>
6: 美团 <com.meituan.imeituan>
7: 小咖秀 <YIXIA.YXCaptureApp.XiaoKaXiu>
8: 手机淘宝 <com.taobao.taobao4iphone>
9: 格瓦拉@电影 <com.gewara.iphone>
Installed apps:
1: 微信 <com.tencent.xin>
2: QQ <com.tencent.mqq>
3: 大众点评 <com.dianping.dpscope>
4: 支付宝 <com.alipay.iphoneclient>
5: 饿了么 <me.ele.ios.eleme>
6: 美团 <com.meituan.imeituan>
7: 小咖秀 <YIXIA.YXCaptureApp.XiaoKaXiu>
8: 手机淘宝 <com.taobao.taobao4iphone>
9: 格瓦拉@电影 <com.gewara.iphone>
10: <com.aswallpaper.mito>
破壳序号为5的app, -b 表示只生产二进制文件 -d表示生产ipa文件
dev-aozhiminde-iPhone:/var/mobile root# Clutch -b 5
Now dumping me.ele.ios.eleme
Preparing to dump <eleme>
Path: /private/var/mobile/Applications/02EF9A7A-E70F-4C34-B083-17B33D3437F3/eleme.app/eleme
DUMP |ARMDumper <armv7> <eleme> Patched cryptid (32bit segment) | ETA: 0h00m00s
Dumping <eleme> (armv7)|=================================================| ETA: 0h00m04s
DUMP |ARMDumper <armv7> <eleme> Writing new checksum
Finished 'stripping' binary <eleme>
Note: This binary will be missing some undecryptable architectures
Finished dumping me.ele.ios.eleme to /var/tmp/clutch/AF8B6858-FFAD-45AD-9B3A-38310BEE3871
Now dumping me.ele.ios.eleme
Preparing to dump <eleme>
Path: /private/var/mobile/Applications/02EF9A7A-E70F-4C34-B083-17B33D3437F3/eleme.app/eleme
DUMP |ARMDumper <armv7> <eleme> Patched cryptid (32bit segment) | ETA: 0h00m00s
Dumping <eleme> (armv7)|=================================================| ETA: 0h00m04s
DUMP |ARMDumper <armv7> <eleme> Writing new checksum
Finished 'stripping' binary <eleme>
Note: This binary will be missing some undecryptable architectures
Finished dumping me.ele.ios.eleme to /var/tmp/clutch/AF8B6858-FFAD-45AD-9B3A-38310BEE3871
Finished dumping me.ele.ios.eleme in 6.5 seconds
/var/tmp/clutch/AF8B6858-FFAD-45AD-9B3A-38310BEE3871就是破解后的文件
最后把Dump的文件cop回到mac上
dev-aozhimindeMacBook-Pro:~ dev-aozhimin$ scp root@172.16.25.116:/var/tmp/clutch/AF8B6858-FFAD-45AD-9B3A-38310BEE3871/me.ele.ios.eleme/eleme ~/Downloads/eleme
root@172.16.25.116's password:
root@172.16.25.116's password:
eleme 100% 7231KB 1.4MB/s 00:05
1 0
- iOS逆向之Clutch砸壳
- Clutch
- IOS逆向之旅
- iOS 应用安全攻防(六):Clutch
- iOS逆向 砸壳
- iOS逆向--dumpdecrypted砸壳
- iOS逆向 砸壳
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS 逆向之ARM汇编
- iOS逆向工程之Theos
- IOS逆向之汇编基础
- Android数据库SQLite
- 令牌桶算法限流
- 生成具有最少节点、高度为H的AVL树的程序
- HDU 5672 查找子串的个数 思维 双指针
- 13届浙江省省赛 C题 Defuse the Bomb
- iOS逆向之Clutch砸壳
- 【Spring进阶】AOP主要概念
- iOS分层架构简介
- 稀疏矩阵
- DP介绍-最长递增子序列
- python初学者常见问题汇总(留作日后参考)
- 备份Foxmail7.2邮箱
- HDU-4587 TWO NODES (割点[Tarjan])
- 2.oracle的dump理解二 Buffer Header和Block Header