Current location - Quotes Website - Personality signature - Cracking of Mac reverse interface checker
Cracking of Mac reverse interface checker
Interface-Checker-Hook Source Code and Results

After contacting iOS for a while, I began to have the idea of cracking Mac app. There are many similarities between the two. With the reverse foundation of iOS, it is quite handy to start a Mac app.

This is my first attempt to crack the Mac app. I chose to be an interface inspector because:

1. After that, you may have to use the interface checker to crack the Mac app.

2. There are many blog posts cracked by interface inspectors on the Internet.

Of course, doing it yourself is a process of exploration and solution, and you won't read other blog posts to find ideas unless you have to. In short, the whole process went smoothly. Next, briefly introduce the cracking process.

Interface inspector is an application to view the hierarchical structure of Mac app, which is equivalent to the Mac version of Reveal.

1.Mac app cracking is usually dylib injection, so build a lib project first.

2. Static analysis of 2.class-dump header file is needed, and Xcode search function can be used conveniently when dump is in the project directory.

3.Hopper finished the analysis of executable files quickly.

Let's start with key words such as demo, vip and license.

Soon we will find SMLicenseManager to engage in isLicensed. Build and inject a set. Open the app to flash back. I did a signature check.

Use Hopper to quickly locate the calling place! =2 is wrong, we modify codeSignState=2. It's done.

Mach_inject_bundle needs to be replaced because the interface checker is in disrepair. Participate in github at the top of the article.