Last active
September 4, 2016 04:34
-
-
Save 0x8badf00d/2a44ecdf5046a6fc6691 to your computer and use it in GitHub Desktop.
Inspect view hierarchy and Decrypt binaries
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Decrypt Binaries from AppStore IPA | |
----------------------------------- | |
* `Cydia` - Add Source - http://cydia.iphonecake.com/ | |
* `Mobile Terminal` - login root - Clutch - Clutch <appname> | |
* `/var/root/` - Location for Decrypted files | |
* `Class-dump` - `./class-dump -H <location-of-binary> -o <location-to-save-header-files>` To dump all headers | |
Inspect View-Hierarchy of Apps | |
------------------------------ | |
* CyDelete - Install CyDelete from Cydia if MobileSubstrate folder is not listed in /Library/. | |
* Copy Spark.dylib to 'Library/MobileSubstrate/DynamicLibraries' | |
``` | |
launchctl setenv DYLD_INSERT_LIBRARIES /Library/MobileSubstrate/DynamicLibraries/SparkInspector.dylib | |
launchctl setenv DYLD_FORCE_FLAT_NAMESPACE '' | |
``` | |
* To inspect Springboard restart using - `sbreload` from UIKitTools or `killall SpringBoard` | |
References - | |
[Clutch Tutorial] (http://jailbreakwiki.org/Clutch_Cracking_Tutorial) | |
[class-dump] (http://stevenygard.com/projects/class-dump/) | |
[Inspecting third party apps] (http://marksands.github.io/2014/01/03/inspecting-third-party-apps.html) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment