brew install ca-certificates
brew install openssl@1.1
brew install ldid
brew install usbmuxd
brew install libimobiledevice
越獄工具(對iOS設(shè)備進(jìn)行越獄)
使用checkra1n越獄
https://checkra.in/releases/
https://www.jianshu.com/p/8beb21bcdae7
使用unc0ver越獄
https://unc0ver.dev/
https://www.jianshu.com/p/5f2d33ba2fb5
主流的越獄工具一般是半完美越獄,iOS設(shè)備重啟后Cydia會閃退打不開,需要重新操作越獄流程
https://palera.in/
https://github.com/palera1n/palera1
https://github.com/palera1n/palera1n/releases
https://theos.dev/docs/installation-ios
https://github.com/AloneMonkey/MonkeyDev/wiki/%E5%AE%89%E8%A3%85
iOS越獄后的ssh連接手機(jī)
ssh root@127.0.0.1
#iproxy-通過USB使用SSH連接iOS設(shè)備
iproxy 9999 22 #端口轉(zhuǎn)發(fā)
ssh -p 9999 root@127.0.0.1
frida安裝
https://build.frida.re
#在cydia中添加frida源
#cydia中搜索frida,根據(jù)iOS設(shè)備版本安裝對應(yīng)的frida服務(wù)端
#Windows10電腦安裝frida(特別注意frida版本要與手機(jī)中的frida版本保持一致)
https://github.com/frida/frida
https://github.com/frida/frida/releases
Filza File Manager安裝,越獄設(shè)備的文件管理器Cydia源
http://tigisoftware.com/cydia/
#TIGI Software ---》 全部工具 ---》 Filza File Manager 64-bit
frida-ios-dump砸殼工具
git clone https://github.com/AloneMonkey/frida-ios-dump.git
cd frida-ios-dump
python -m pip install -r requirements.txt --upgrade
dump.py -l
frida-ps -U
python dump.py -H 127.0.0.1 -p 9999 -u root -P alpine 《app_name》
查看iOS手機(jī)是否越獄
whoami
iOS App應(yīng)用本地存儲位置
/private/var/containers/Bundle/Application
越獄插件路徑
/Applications/
正常安裝路徑
/private/var/mobile/Containers/Data/Application/
安裝iOS安裝包
ideviceinstaller -i ***..ipa
iOS查看系統(tǒng)日志
idevicesyslog
iOS查看當(dāng)前已連接的設(shè)備的UUID
idevice_id -l
iOS截圖
idevicescreenshot
iOS查看設(shè)備信息
ideviceinfo
ideviceinfo -u [udid] -k DeviceName #指定設(shè)備,獲取設(shè)備名稱:iPhone6s
idevicename -u [udid] #指定設(shè)備,獲取設(shè)備名稱:iPhone6s
ideviceinfo -u [udid] -k ProductVersion #指定設(shè)備,獲取設(shè)備版本:10.3.1
ideviceinfo -u [udid] -k ProductType #指定設(shè)備,獲取設(shè)備類型:iPhone8,1
ideviceinfo -u [udid] -k ProductName #指定設(shè)備,獲取設(shè)備系統(tǒng)名稱:iPhone OS
iOS獲取app列表和信息
ideviceinstaller -l
iOS獲取設(shè)備時(shí)間
iOS重啟設(shè)備
idevicediagnostics restart
iOS關(guān)機(jī)
idevicediagnostics shutdown
iOS休眠
idevicediagnostics sleep
iOS安裝SSL Kill Switch 2以突破或繞過SSL Pinning、Certificate Pinning,解決Charles、Fiddler等網(wǎng)絡(luò)代理工具開啟SSL Proxying后HTTPS抓包,用于禁用iOS上的SSL/TLS的證書校驗(yàn)機(jī)制,以便能抓取到明文的數(shù)據(jù)包
https://github.com/nabla-c0d3/ssl-kill-switch2
https://github.com/nabla-c0d3/ssl-kill-switch2/releases
scp -P 9999 com.nablac0d3.sslkillswitch2_0.14.deb root@127.0.0.1:/tmp
dpkg -i com.nablac0d3.sslkillswitch2_0.14.deb
killall -HUP SpringBoard
#打開iOS設(shè)置,下滑找到SSL Kill Switch 2,確認(rèn)Disable Certificate Validation已開啟
FLEXLoader動態(tài)加載FLEX的越獄插件
https://github.com/FLEXTool/FLEX
https://github.com/FLEXTool/FLEX/releases
https://cloud.tencent.com/developer/article/1873827
Zorro安裝,Zorro是一款基于iOS端的參數(shù)修改工具
#添加軟件源
apt.jituvip.com
#極兔軟件源 ---》 佐羅Zorro ---》 安裝6.6.1
iOS平臺上輕松跟蹤類、函數(shù)和修改方法的返回值
https://github.com/noobpk/frida-ios-hook
https://github.com/noobpk/frida-ios-hook/releases
iOS安全測試框架
https://github.com/WithSecureLabs/needle
https://github.com/WithSecureLabs/needle/releases
Frida Scripts
https://github.com/interference-security/frida-scripts
https://github.com/interference-security/frida-scripts/tree/master/iOS
AppMon是監(jiān)測和修改本地MacOS、iOS、Android系統(tǒng)API的自動化框架
git clone https://github.com/dpnishant/appmon
cd appmon && git checkout LISTEN_MODE
python appmon.py -mode listen
curl “http://127.0.0.1:5000/connect/?a=Gadget&spawn=0&p=iossim&s=scripts/iOS&ls=0&report=test”
編輯:黃飛
評論
查看更多