Submit Search
Upload
iOS recon with Radare2
•
0 likes
•
428 views
NowSecure
Follow
Originally presented April 4, 2020 @ VirSecCon2020
Read less
Read more
Technology
Report
Share
Report
Share
1 of 9
Recommended
Breaking iOS Apps using Cycript
Breaking iOS Apps using Cycript
n|u - The Open Security Community
System models 2 in distributed system
System models 2 in distributed system
ishapadhy
Algoritmos 05 - Estruturas de repetição
Algoritmos 05 - Estruturas de repetição
Professor Samuel Ribeiro
Programas Desarrolla Aplicaciones Moviles
Programas Desarrolla Aplicaciones Moviles
SykesPonce
Aula 7 pc - estrutura
Aula 7 pc - estrutura
Elaine Cecília Gatto
Introduction to System Calls
Introduction to System Calls
Vandana Salve
POO - Aula 10 - Polimorfismo
POO - Aula 10 - Polimorfismo
Felipe J. R. Vieira
Process Management in Android
Process Management in Android
Shrey Verma
Recommended
Breaking iOS Apps using Cycript
Breaking iOS Apps using Cycript
n|u - The Open Security Community
System models 2 in distributed system
System models 2 in distributed system
ishapadhy
Algoritmos 05 - Estruturas de repetição
Algoritmos 05 - Estruturas de repetição
Professor Samuel Ribeiro
Programas Desarrolla Aplicaciones Moviles
Programas Desarrolla Aplicaciones Moviles
SykesPonce
Aula 7 pc - estrutura
Aula 7 pc - estrutura
Elaine Cecília Gatto
Introduction to System Calls
Introduction to System Calls
Vandana Salve
POO - Aula 10 - Polimorfismo
POO - Aula 10 - Polimorfismo
Felipe J. R. Vieira
Process Management in Android
Process Management in Android
Shrey Verma
Coding standard
Coding standard
FAROOK Samath
Method Overloading In Java
Method Overloading In Java
CharthaGaglani
Polymorphism in oop
Polymorphism in oop
MustafaIbrahimy
Bankers algorithm
Bankers algorithm
AAQIB PARREY
Operating system 24 mutex locks and semaphores
Operating system 24 mutex locks and semaphores
Vaibhav Khanna
Deadlock Prevention
Deadlock Prevention
prachi mewara
Virtual memory ppt
Virtual memory ppt
RITULDE
Operating System Process Synchronization
Operating System Process Synchronization
Haziq Naeem
Refactoring: A First Example - Martin Fowler’s First Example of Refactoring, ...
Refactoring: A First Example - Martin Fowler’s First Example of Refactoring, ...
Philip Schwarz
The Art Of Debugging
The Art Of Debugging
svilen.ivanov
System call
System call
Sumant Diwakar
Ferramentas Case de Teste
Ferramentas Case de Teste
Beatriz Marques
Deadlock Avoidance - OS
Deadlock Avoidance - OS
MsAnita2
Implementation of FIFO in Linux
Implementation of FIFO in Linux
Tushar B Kute
Writing php extensions in golang
Writing php extensions in golang
do_aki
Deadlock and Banking Algorithm
Deadlock and Banking Algorithm
MD.ANISUR RAHMAN
2 Object Oriented Programming
2 Object Oriented Programming
Praveen M Jigajinni
Programação Orientada a Objetos (POO) com PHP - Parte 1
Programação Orientada a Objetos (POO) com PHP - Parte 1
Israel Messias
Chapter 7 - Deadlocks
Chapter 7 - Deadlocks
Wayne Jones Jnr
polymorphism ppt
polymorphism ppt
sheetal singh
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
NowSecure
How To Use Scala At Work - Airframe In Action at Arm Treasure Data
How To Use Scala At Work - Airframe In Action at Arm Treasure Data
Taro L. Saito
More Related Content
What's hot
Coding standard
Coding standard
FAROOK Samath
Method Overloading In Java
Method Overloading In Java
CharthaGaglani
Polymorphism in oop
Polymorphism in oop
MustafaIbrahimy
Bankers algorithm
Bankers algorithm
AAQIB PARREY
Operating system 24 mutex locks and semaphores
Operating system 24 mutex locks and semaphores
Vaibhav Khanna
Deadlock Prevention
Deadlock Prevention
prachi mewara
Virtual memory ppt
Virtual memory ppt
RITULDE
Operating System Process Synchronization
Operating System Process Synchronization
Haziq Naeem
Refactoring: A First Example - Martin Fowler’s First Example of Refactoring, ...
Refactoring: A First Example - Martin Fowler’s First Example of Refactoring, ...
Philip Schwarz
The Art Of Debugging
The Art Of Debugging
svilen.ivanov
System call
System call
Sumant Diwakar
Ferramentas Case de Teste
Ferramentas Case de Teste
Beatriz Marques
Deadlock Avoidance - OS
Deadlock Avoidance - OS
MsAnita2
Implementation of FIFO in Linux
Implementation of FIFO in Linux
Tushar B Kute
Writing php extensions in golang
Writing php extensions in golang
do_aki
Deadlock and Banking Algorithm
Deadlock and Banking Algorithm
MD.ANISUR RAHMAN
2 Object Oriented Programming
2 Object Oriented Programming
Praveen M Jigajinni
Programação Orientada a Objetos (POO) com PHP - Parte 1
Programação Orientada a Objetos (POO) com PHP - Parte 1
Israel Messias
Chapter 7 - Deadlocks
Chapter 7 - Deadlocks
Wayne Jones Jnr
polymorphism ppt
polymorphism ppt
sheetal singh
What's hot
(20)
Coding standard
Coding standard
Method Overloading In Java
Method Overloading In Java
Polymorphism in oop
Polymorphism in oop
Bankers algorithm
Bankers algorithm
Operating system 24 mutex locks and semaphores
Operating system 24 mutex locks and semaphores
Deadlock Prevention
Deadlock Prevention
Virtual memory ppt
Virtual memory ppt
Operating System Process Synchronization
Operating System Process Synchronization
Refactoring: A First Example - Martin Fowler’s First Example of Refactoring, ...
Refactoring: A First Example - Martin Fowler’s First Example of Refactoring, ...
The Art Of Debugging
The Art Of Debugging
System call
System call
Ferramentas Case de Teste
Ferramentas Case de Teste
Deadlock Avoidance - OS
Deadlock Avoidance - OS
Implementation of FIFO in Linux
Implementation of FIFO in Linux
Writing php extensions in golang
Writing php extensions in golang
Deadlock and Banking Algorithm
Deadlock and Banking Algorithm
2 Object Oriented Programming
2 Object Oriented Programming
Programação Orientada a Objetos (POO) com PHP - Parte 1
Programação Orientada a Objetos (POO) com PHP - Parte 1
Chapter 7 - Deadlocks
Chapter 7 - Deadlocks
polymorphism ppt
polymorphism ppt
Similar to iOS recon with Radare2
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
NowSecure
How To Use Scala At Work - Airframe In Action at Arm Treasure Data
How To Use Scala At Work - Airframe In Action at Arm Treasure Data
Taro L. Saito
Aerospike Data Modeling - Meetup Dec 2019
Aerospike Data Modeling - Meetup Dec 2019
Aerospike
05 - Bypassing DEP, or why ASLR matters
05 - Bypassing DEP, or why ASLR matters
Alexandre Moneger
Experiences with serverless for high throughput low usage applications | ryan...
Experiences with serverless for high throughput low usage applications | ryan...
AWSCOMSUM
The Cool Interface
The Cool Interface
David Hohl
Deep dive into Ruby's require - RubyConf Taiwan 2023
Deep dive into Ruby's require - RubyConf Taiwan 2023
Hiroshi SHIBATA
Lightning Talk: From Sinatra to Grape.pdf
Lightning Talk: From Sinatra to Grape.pdf
Renato675806
CIS14: Best Practices You Must Apply to Secure Your APIs
CIS14: Best Practices You Must Apply to Secure Your APIs
CloudIDSummit
Useful C++ Features You Should be Using
Useful C++ Features You Should be Using
Embarcadero Technologies
Future of pandas
Future of pandas
Jeff Reback
Padrino is agnostic
Padrino is agnostic
Takeshi Yabe
Node.js Deeper Dive
Node.js Deeper Dive
Justin Reock
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
Onapsis Inc.
A Java Implementer's Guide to Better Apache Spark Performance
A Java Implementer's Guide to Better Apache Spark Performance
Tim Ellison
MOBILE PENTESTING Frida.pdf
MOBILE PENTESTING Frida.pdf
Adityamd4
IDERA Live | Working with Complex Data Environments
IDERA Live | Working with Complex Data Environments
IDERA Software
Kernel Recipes 2018 - Zinc: minimal lightweight crypto API - Jason Donenfeld
Kernel Recipes 2018 - Zinc: minimal lightweight crypto API - Jason Donenfeld
Anne Nicolas
Interactive Analytics using Apache Spark
Interactive Analytics using Apache Spark
Sachin Aggarwal
Scala and spark
Scala and spark
Janu Jahnavi
Similar to iOS recon with Radare2
(20)
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
How To Use Scala At Work - Airframe In Action at Arm Treasure Data
How To Use Scala At Work - Airframe In Action at Arm Treasure Data
Aerospike Data Modeling - Meetup Dec 2019
Aerospike Data Modeling - Meetup Dec 2019
05 - Bypassing DEP, or why ASLR matters
05 - Bypassing DEP, or why ASLR matters
Experiences with serverless for high throughput low usage applications | ryan...
Experiences with serverless for high throughput low usage applications | ryan...
The Cool Interface
The Cool Interface
Deep dive into Ruby's require - RubyConf Taiwan 2023
Deep dive into Ruby's require - RubyConf Taiwan 2023
Lightning Talk: From Sinatra to Grape.pdf
Lightning Talk: From Sinatra to Grape.pdf
CIS14: Best Practices You Must Apply to Secure Your APIs
CIS14: Best Practices You Must Apply to Secure Your APIs
Useful C++ Features You Should be Using
Useful C++ Features You Should be Using
Future of pandas
Future of pandas
Padrino is agnostic
Padrino is agnostic
Node.js Deeper Dive
Node.js Deeper Dive
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Java Implementer's Guide to Better Apache Spark Performance
A Java Implementer's Guide to Better Apache Spark Performance
MOBILE PENTESTING Frida.pdf
MOBILE PENTESTING Frida.pdf
IDERA Live | Working with Complex Data Environments
IDERA Live | Working with Complex Data Environments
Kernel Recipes 2018 - Zinc: minimal lightweight crypto API - Jason Donenfeld
Kernel Recipes 2018 - Zinc: minimal lightweight crypto API - Jason Donenfeld
Interactive Analytics using Apache Spark
Interactive Analytics using Apache Spark
Scala and spark
Scala and spark
More from NowSecure
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
NowSecure
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
NowSecure
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
NowSecure
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
NowSecure
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
NowSecure
Jeff's Journey: Best Practices for Securing Mobile App DevOps
Jeff's Journey: Best Practices for Securing Mobile App DevOps
NowSecure
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
NowSecure
A Risk-Based Mobile App Security Testing Strategy
A Risk-Based Mobile App Security Testing Strategy
NowSecure
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
NowSecure
iOS 12 Preview - What You Need To Know
iOS 12 Preview - What You Need To Know
NowSecure
5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing
NowSecure
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
NowSecure
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
NowSecure
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
NowSecure
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
NowSecure
What attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTech
NowSecure
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
NowSecure
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
NowSecure
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
NowSecure
More from NowSecure
(20)
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
Jeff's Journey: Best Practices for Securing Mobile App DevOps
Jeff's Journey: Best Practices for Securing Mobile App DevOps
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
A Risk-Based Mobile App Security Testing Strategy
A Risk-Based Mobile App Security Testing Strategy
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
iOS 12 Preview - What You Need To Know
iOS 12 Preview - What You Need To Know
5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
What attackers know about your mobile apps that you don’t: Banking & FinTech
What attackers know about your mobile apps that you don’t: Banking & FinTech
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Recently uploaded
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Recently uploaded
(20)
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
iOS recon with Radare2
1.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.© Copyright 2019 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. iOS recon with r2 Dawn Isabel Mobile Security Research Engineer
2.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. ▪ Portable reverse engineering framework ▪ Assemble / disassemble ▪ Analyze and emulate code ▪ Native debugger ▪ Various interactive modes ▪ Control-flow graphs ▪ Automate your mobile app static analysis 2 What is radare2, and why use it?
3.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. ▪ Apps are packaged in a zip file ▪ Native binaries will be ▪ Objective-C ▪ Swift ▪ C, C++ ▪ Analysis and emulation makes our job easier! ▪ aar - Analyze opcode absolute and relative references ▪ aae - Emulate code to identify new pointer references ▪ aao - Analyze all objc references ▪ e emu.str=true – Enable string emulation 3 iOS binary basics
4.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Why use multiple tools? ▪ i – Binary information ▪ il – List libraries ▪ ic / icc – Examine and dump classes ▪ izz – Dump and search strings 4 Gathering basic app info
5.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. ▪ Objective-C methods are invoked using message-passing ▪ objc_msgSend ▪ arg0: class or instance receiving the message ▪ arg1: method name / “selector” ▪ arg2…argN: method arguments ▪ Finding cross-references to methods requires looking for the selector string, not the address of the method implementation 5 Finding method cross-references
6.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. ▪ izz~ / izzq~ - Search for a string ▪ axt – Find cross-references (xrefs) to an address ▪ s – Seek to address ▪ n / N - Jump next / previous flag ▪ df – Define function ▪ pdsf – Print disassemble summary for function 6 Simple Workflow – finding functions and references
7.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. ▪ _ - Search using HUD ▪ x – Find xrefs to/from data ▪ u / U – Undo / redo seek ▪ p – change view ▪ V – Graph mode! 7 Getting fancy - visual mode
8.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. ▪ Recon can be easily automated using python and r2pipe import r2pipe r2 = r2pipe.open("ipa://decrypted-app.ipa") print("[*] Dumping classes...") r2.cmd('icc > classdump.txt') print("[*] Dumping strings...") r2.cmd("izz > strings.txt") 8 Automation with r2pipe
9.
© Copyright 2019
NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. ▪ https://rada.re/n/ ▪ https://radare.gitbooks.io/radare2book/ ▪ https://www.youtube.com/results?search_query=r2con ▪ https://github.com/prateek147/DVIA Dawn Isabel (she/her) @dawnisabel 9 Happy hacking!