Zum Inhalt springen

Basement

  • About
  • Contact
  • Disclaimer

Kategorie: reverse engineering

iOS: Patching security features of mobile app with Ghidra

17. April 201918. April 2019

Every mobile app security researcher faces the day, he will not be delivered with a properly prepared app for testing, or you face another blackbox security assessment. Until now I used Hopper Disassembler for static binary analysis/patching. Since recently Ghidra a new tool by the NSA was released, I decided to give it a try. […]

Veröffentlicht unter ghidra, iOS, reverse engineering

iOS: Defeating Swift jailbreak detection

24. Februar 201924. Februar 2019

Abstract. Today we are looking at a simple Swift program that uses a jailbreak detection function. To increase the fun and get some practical code at the end of the day, I searched for a jailbreak detection function for Swift online. The foundation code can be found here. The main goal is, to bypass the […]

Veröffentlicht unter iOS, reverse engineering, swift

iOS: Decompiling and analyzing a simple Swift app #1

19. Februar 201920. Februar 2019

In the previous blog post we looked into a simple iOS Swift app decompiled with Hopper Disassembler. If you have not yet looked into it I highly recommend to do so, otherwise you may not get the point. This is a follow up post, which covers an additional question that was raised during the analysis: […]

Veröffentlicht unter iOS, reverse engineering, swift

iOS: Decompiling and analyzing a simple Swift app #0

18. Februar 201919. Februar 2019

Abstract. This writeup covers the process of creating, disassembling and analyzing a very simple iOS app written in Swift. The main insight for me was an interesting handling of strings in Swift and how they are represented in the disassembly created by Hopper Disassembler. These insights, might be useful in future researches. Tools. Xcode Hopper […]

Veröffentlicht unter iOS, reverse engineering, swift
© 2025 Basement • mezdanak.de by mezdanak.