请教一下:
在IOS 10.2的越狱系统中,使用dumpdecrypted砸壳时,报错:
先是报错:
Killed: 9
通过输入命令:
su mobile
解决。
后面就报错:
wwde-iPhone:/var/root mobile$ DYLD_INSERT_LIBRARIES=/private/var/mobile/Containers/Data/Application/44D88C22-0D12-4A0E-8DA0-0BB31AC4170F/Documents/dumpdecrypted.dylib /var/containers/Bundle/Application/1F4B0FA7-4D39-4BA4-A563-E56B679975FB/XXXXXX.app/XXXXXX
dyld: could not load inserted library ‘/private/var/mobile/Containers/Data/Application/44D88C22-0D12-4A0E-8DA0-0BB31AC4170F/Documents/dumpdecrypted.dylib’ because no suitable image found. Did find:
/private/var/mobile/Containers/Data/Application/44D88C22-0D12-4A0E-8DA0-0BB31AC4170F/Documents/dumpdecrypted.dylib: file system sandbox blocked mmap() of ‘/private/var/mobile/Containers/Data/Application/44D88C22-0D12-4A0E-8DA0-0BB31AC4170F/Documents/dumpdecrypted.dylib’
解决了吗?发现把dumpdecrypted放到手机/usr/lib/里面,不会报这个错误,但是试过在很多路径下执行,都会报下面的错误:
[+] detected 64bit ARM binary in memory.
[+] offset to cryptid found: @0x100038cf8(from 0x100038000) = cf8
[+] Found encrypted data at address 00004000 of length 59457536 bytes - type 1.
[+] Opening /private/var/containers/Bundle/Application/51F6DC2B-E1E8-4EE7-AB17-2866684D6907/WeChat.app/WeChat for reading.
[+] Reading header
[+] Detecting header type
[+] Executable is a plain MACH-O image
[+] Opening WeChat.decrypted for writing.
[-] Failed opening: Operation not permitted
一起研究一下?