//
you're reading...
iOS

Decrypting apps on iOS 6 – Part 1: single architecture

Two blogs will be posted for this topic and two free apps are picked to show some differences based on their build options.

iOS app manual decryption can be done by the following steps.

  • Finding the starting offset and the size of encrypted area in an app’s executable
  • Finding the memory loading address of an app under test
  • Dumping the decrypted portion of an app on memory using a debugger
  • Overwriting an app’s executable with dumped binary data

An app downloaded from Apple Store is encrypted and you can find the encryption information in the header of an app’s executable. Some fields in the header we use are cryptid (1: encrypted, 0: plain), cryptoff (starting offset of encrypted area), and cryptsize (size of encrypted area). There are other fields we need to check if an app supports multiple architectures and you will see them in the following blog

When an app is loaded, its encrypted area is decrypted by loader. Take advantage of this process and dump the decrypted area using a debugger.

The last step for the decryption will be overwriting the encrypted area of an executable with the dumped data.

Single architecture and no PIE

An app in this category is the simplest one to decrypt because you can easily find a starting offset/size in an executable and its code and data sections are loaded as set in its header. You will see how to decrypt an app built with PIE in the 2nd part.

Let’s take a look at a simple app in terms of decryption.

Log into your jailbroken device via ssh, and go to the directory where an app resides. The directory will be under “/var/mobile/Applications/”. Run otool to see how the app is built (Figure 1).

Screen Shot 01

Figure 1. Initial analysis with otool

You can confirm this app is compiled without PIE with the result of “otool -vh”, but you can see it is encrypted by checking cryptid (1 means encrypted, 0 means decrypted) on Figure 1. cryptoff is 4096 (0×1000) and cryptsize is 405504 (0×63000) in this example. Hence we will overwrite the area between 0×1000 and 0×64000 with decrypted data at a later time.

To see where this app is loaded on memory, run otool again with -l option (Figure 2).

Screen Shot 2013-01-26 at 9.14.03 PM

Figure 2. Base address

It will be loaded at 0×1000, which means the decrypted area of the app will be loaded between 0×2000 (base address + cryptoff) and 0×65000 (base address + cryptoff + cryptsize). So we will dump this area.

Again we will not decrypt any encrypted data by ourselves. Instead we ask loader to do that for us and we just dump decrypted data using a debugger. Run the app under test. Then attach gdb to the loaded app and dump memory as follows (see Figure 3).

Screen Shot 2013-01-26 at 5.56.21 PM

Figure 3. Dumping the decrypted area

Copy the app’s executable and decrypted.bin to your Mac.

Before overwriting the executable, let’s see the snippet of class-dump-z result

$ ./class-dump-z GuessWord

Screen Shot 2013-01-26 at 7.22.36 PM

Figure 4. Encrypted app

Now overwrite the file with decrypted.bin

$ dd seek=0×1000 bs=1 conv=notrunc if=./decrypted.bin of=./GuessWord

We are not done yet, if you run otool again, you will see that the executable still seems to be encrypted (Figure 5).

Screen Shot 2013-01-26 at 7.28.38 PM

Figure 5. Checking cryptid

We need to update cryptid as well. Open the executable with any hex editor, and search “/System/Library/Frameworks”. Before the string, you can find something similar to the highlighted string as follows (see Figure 6).

Screen Shot 2013-01-26 at 7.32.49 PM

Figure 6. Finding cryptic

You need to change the number 01 to 00 at the end of highlighted part. So it will be like this (see Figure 7).

Screen Shot 2013-01-26 at 7.39.14 PM

Figure 7. Update cryptic

Check encryption status again with otool (Figure 8).

Screen Shot 2013-01-26 at 7.39.58 PM

Figure 8. Confirm the change of cryptid

Let’s check the result of class-dump-z

$ ./class-dump-z GuessWord

Screen Shot 2013-01-26 at 7.41.29 PM

Figure 9. Decrypted app

Testing environment

  • OS: iOS 6.01
  • Device: jailbroken iPod 4G
  • tools: otool, gdb, class-dump-z

Reference

  • Hacking and Securing iOS Applications - O’REILLY: chapter 7
About these ads

About DblH

System programmer, kernel mode developer, rce, malcode analyst.

Discussion

2 thoughts on “Decrypting apps on iOS 6 – Part 1: single architecture

  1. I was recommended this web site by way of my cousin.
    I am now not positive whether or not this put up is written by way of him as
    no one else recognise such detailed about my problem.
    You’re incredible! Thanks!

    Posted by rhscyz.com | May 18, 2013, 1:16 pm
  2. Useful information. Fortunate me I discovered your site by chance, and I am stunned why this twist of fate didn’t happened earlier! I bookmarked it.

    Posted by Candy Crush Saga Help Level 70 | July 26, 2013, 11:55 am

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: