Mengaitkan libboringssl.dylib untuk mengekstrak kunci TLS dan memungkinkan dekripsi lalu lintas jaringan dari aplikasi iOS untuk didekripsi.
frida -U -l ios-tls-keylogger.js --no-pause -o keylogfile.txt -p 2845
atau
frida -U -l ios-tls-keylogger.js --no-pause -o keylogfile.txt -f com.apple.shortcuts
Juga tersedia di Frida Codeshare.
frida -U --codeshare jankais3r/ios-15-tls-keylogger --no-pause -o keylogfile.txt -p 2845
atau
frida -U --codeshare jankais3r/ios-15-tls-keylogger --no-pause -o keylogfile.txt -f com.apple.shortcuts
/System/Library/Caches/com.apple.dyld
.dsc_extractor com.apple.dyld/dyld_shared_cache_arm64 extracted
./usr/lib/libboringssl.dylib
di Binary Ninja atau serupa.ssl_log_secret
. Contoh kedua dari instruksi ldr
menahan offset kita. 0000000199381680 int64_t bssl::ssl_log_secret(void* arg1, int64_t arg2, char* arg3, int64_t arg4)
0000000199381680 sub sp, sp, #0x60
0000000199381684 stp x22, x21, [sp, #0x30]
0000000199381688 stp x20, x19, [sp, #0x40]
000000019938168c stp x29, x30, [sp, #0x50]
0000000199381690 add x29, sp, #0x50
0000000199381694 ldr x8, [x0, #0x78]
0000000199381698 ldr x8, [x8, #0x2f8] ; <--- This is our offset
000000019938169c cbz x8, 0x1993817a4
versi iOS | MD5 (/usr/lib/libboringssl.dylib) | Mengimbangi |
---|---|---|
15.0 | 331e2de619435e8a9eb1c61df6a1ad71 | 0x2f8 |
15.0.1 | b5c9e2183fd9727111ebe354f235c366 | 0x2f8 |
15.0.2 | c66960115dd2d8f76940e445a5b88e3b | 0x2f8 |
15.1 | 63eb7d8f4c1fa57751b6348531b61633 | 0x2f8 |
15.2 | 92bf3f6f87e7be25135b0ac7ec479bc4 | 0x2f8 |
15.2.1 | 57a6e4f13597e3052bfd5bb3a6991346 | 0x2f8 |
15.3 | e2e01c1f89e2467d28b672937aac9a29 | 0x2f8 |
15.3.1 | e2e01c1f89e2467d28b672937aac9a29 | 0x2f8 |
15.4 | ee4132c6469e4c3fceb6ddce4ddd12ad | 0x2f8 |
15.4.1 | b50ab797ad8ada3d8a2ed8d1faa02fc4 | 0x2f8 |
15.5 | 198d42ff836f4cb72dac2d200fc47a7e | 0x2f8 |
15.6 | 67d83be27f553d7959a94c90f90f060b | 0x2f8 |
15.6.1 | 67d83be27f553d7959a94c90f90f060b | 0x2f8 |
15.7 | 9b81ff819e641de2007a140054a24e59 | 0x2f8 |
15.7.1 | 28da87d0f8384149f3f0631193e02a78 | 0x2f8 |