Cracking on iPhone Phoenixdev Tutorial.pdf


Preview of PDF document cracking-on-iphone-phoenixdev-tutorial.pdf

Page 12325

Text preview


Keygening Phoenix-Dev Shrink v0.9.9-5 by BLZPDA

table of contents
foreword .................................................................................................................................................. 2
requirements ........................................................................................................................................... 2
license process ........................................................................................................................................ 3
initial disassembling ................................................................................................................................ 3
identifying rsa .......................................................................................................................................... 6
the anti gdb code..................................................................................................................................... 9
hunt for the real keychecks ..................................................................................................................... 9
checksum/hash analyzing...................................................................................................................... 11
encryption with modulo ........................................................................................................................ 12
creating a mobile substrate debugger .................................................................................................. 12
why a legit key is needed ...................................................................................................................... 13
how mac address is involved ................................................................................................................. 14
thinking (debugging) outside the box (iphone) ..................................................................................... 15
mac address shuffling ............................................................................................................................ 17
LC_UUID lookup .................................................................................................................................... 18
finding the exponent ............................................................................................................................. 19
decrypting the decrypted ...................................................................................................................... 21
coding the keygen ................................................................................................................................. 22
what has gone wrong ............................................................................................................................ 25
aftermath............................................................................................................................................... 25