iOS逆向之Clutch砸壳

来源:互联网 发布:如何使用海关数据 编辑:程序博客网 时间:2024/05/16 10:58
https://github.com/KJCracks/Clutch/releases,去这个网站下载Clutch的Release包,然后通过Scp命令copy到iPhone上。

dev-aozhimindeMacBook-Pro:~ dev-aozhimin$ scp ~/Downloads/Clutch.2.0/Clutch root@172.16.25.116:/usr/bin
root@172.16.25.116's password:
Clutch                                                            100% 1156KB   1.1MB/s   00:00  

clutch的参数
dev-aozhiminde-iPhone:/usr/bin root# Clutch                                                       
Usage: Clutch [OPTIONS]
-b --binary-dump <value> Only dump binary files from specified bundleID
-d --dump <value>        Dump specified bundleID into .ipa file
-i --print-installed     Print installed applications
   --clean               Clean /var/tmp/clutch directory
   --version             Display version and exit
-? --help                Display this help and exit

显示已经装了的app
dev-aozhiminde-iPhone:/usr/bin root# Clutch --print-installed
Installed apps:
 1:   微信 <com.tencent.xin>
 2:   QQ <com.tencent.mqq>
 3:   大众点评 <com.dianping.dpscope>
 4:   支付宝 <com.alipay.iphoneclient>
 5:   饿了么 <me.ele.ios.eleme>
 6:   美团 <com.meituan.imeituan>
 7:   小咖秀 <YIXIA.YXCaptureApp.XiaoKaXiu>
 8:   手机淘宝 <com.taobao.taobao4iphone>
 9:   格瓦拉@电影 <com.gewara.iphone>
 10:   <com.aswallpaper.mito>


破壳序号为5的app, -b 表示只生产二进制文件 -d表示生产ipa文件
dev-aozhiminde-iPhone:/var/mobile root# Clutch -b 5
Now dumping me.ele.ios.eleme
Preparing to dump <eleme>
Path: /private/var/mobile/Applications/02EF9A7A-E70F-4C34-B083-17B33D3437F3/eleme.app/eleme
DUMP |ARMDumper <armv7> <eleme> Patched cryptid (32bit segment)          | ETA: 0h00m00s
Dumping <eleme> (armv7)|=================================================| ETA: 0h00m04s

DUMP |ARMDumper <armv7> <eleme> Writing new checksum
Finished 'stripping' binary <eleme>
Note: This binary will be missing some undecryptable architectures

Finished dumping me.ele.ios.eleme to /var/tmp/clutch/AF8B6858-FFAD-45AD-9B3A-38310BEE3871
Finished dumping me.ele.ios.eleme in 6.5 seconds

/var/tmp/clutch/AF8B6858-FFAD-45AD-9B3A-38310BEE3871就是破解后的文件

最后把Dump的文件cop回到mac上
dev-aozhimindeMacBook-Pro:~ dev-aozhimin$ scp root@172.16.25.116:/var/tmp/clutch/AF8B6858-FFAD-45AD-9B3A-38310BEE3871/me.ele.ios.eleme/eleme ~/Downloads/eleme
root@172.16.25.116's password:
eleme                                                             100% 7231KB   1.4MB/s   00:05  
1 0