1
0
mirror of https://github.com/ivRodriguezCA/RE-iOS-Apps synced 2026-01-09 18:42:49 +00:00

- Moved Module 3 solutions to a new file.

- Added some troubleshooting for cycript errors.
- Fixed some typos.
This commit is contained in:
Ivan Rodriguez
2019-05-23 08:48:50 -07:00
parent 7a17c5d300
commit a70d653b9a
4 changed files with 43 additions and 25 deletions

View File

@@ -14,7 +14,7 @@ For this exercise I'm going to exclusively use `Hopper` because I don't know how
- Load the `CoinZa` binary in `Hopper`.
- Search for the `Utils` class and select the `isJailbroken` method.
- If you're not there, select the `CFG mode` tab to see the method's assembly code.
- As most of the jailbreak detection methods, this is a long list of checks with early returns if any of this checks is successful. In the flow graph we can see that most of the checks have a jump to a label `loc_100009cc4` (this might be different on your end), but the important part is that the instruction that's executed when jumping to this label:
- As most of the jailbreak detection methods, this is a long list of checks with early returns if any of these checks is successful. In the flow graph we can see that most of the checks have a jump to a label `loc_100009cc4` (this might be different on your end), but the important part is that the instruction that's executed when jumping to this label:
```assembly
orr w20, wzr, #0x1
```