Please note that in this article, we will be debugging and patching the application which is x86 architecture on a laptop, however you can do the same patching with ARM executable as well by copying the binary from the device. Our task is to patch this application in such a way that the application allows us to login even if the username/password combination is not correct. It accepts a certain username/password combination in order to allow us to login. Just to quickly recap, the GDB-Demo had a login form like this. I highly recommend that you read Part 26 before you proceeed with this article. In this article also, we will use the same demo application that we used in Part 26, the GDB-Demo application that you can download from my github profile. Anyways, once you download the Hopper app, this is the interface we are looking at. I would recommend you check out the demo version which lets you perform some tasks to get a feel of Hopper. I think it is an incredible price given the things we can do with this application. In this article, i am using a paid version of Hopper which cost about $60. Hopper is specialized in retrieving Objective-C information in the files you analyze, like selectors, strings and messages sent. Hopper is a reverse engineering tool for OS X, Linux and Windows, that lets you disassemble, decompile and debug (OS X only) your 32/64bits Intel Mac, Windows and iOS (ARM) executables! Take a look at the feature list below!Įven if Hopper can disassemble any kind of Intel executable, it does not forget its main platform.
0 Comments
Leave a Reply. |