Last active
September 25, 2016 20:19
-
-
Save sz3n/c36e80af19bfe5caea790a801ce3f9f0 to your computer and use it in GitHub Desktop.
ios pentest
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://www.jianshu.com/p/6a1cf4416375 | |
install adv-cmds | |
http://bbs.iosre.com/t/dumpdecrypted/974/20 | |
.sqlite | |
.db | |
.plist | |
plutil | |
ps ax | grep xxx | |
cycript -p [pid] | |
UIApp | |
UIApp.delegate | |
function tryPrintIvars(a){ var x={}; for(i in *a){ try{ x[i] = (*a)[i]; } catch(e){} } return x; } | |
function printMethods(className){ | |
var count = new new Type("I"); | |
var methods = class_copyMethodList(objc_getClass(className), count); | |
var methodsArray = []; | |
for(var i=0; i<*count;i++) { | |
var method = methods[i]; | |
methodsArray.push({selector:method_getName(method), implementation:method_getImplementation(method)}); | |
} | |
free(methods); | |
free(count); | |
return methodsArray; | |
} | |
tryPrintIvars(UIApp.keyWindow.rootViewController) | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment