KSSystemInfoJailBreakHelperWtloginPlatformInfo

前言

  • KSSystemInfo 、JailBreakHelper、 WtloginPlatformInfo
JailBreakHelper

KSSystemInfo

WtloginPlatformInfo

SafeDeviceData

<!-- [SafeDeviceData uuid](void * self, void * _cmd) { -->

OpenUDID

<!-- [OpenUDID _generateFreshOpenUDID]( -->


see also

<!-- Jekyll markdown 渲染器 -->

# 指定使用 kramdown 作为 markdown 渲染器
markdown: kramdown

kramdown:
    input: GFM

<!-- github page -->


<!-- Catalog -->

+## Catalog
 
 
 1.  [Foreword](#foreword)
 2.  [CommonJS & Node](#commonjs--node)
-3.  [History](#node)
+3.  [History](#history)
 4.  [RequireJS & AMD](#requirejs--amd)
 5.  [SeaJS & CMD](#seajs--cmd)
 6.  [AMD vs CMD](#amd-vs-cmd)


<!-- https://github.com/hidva/hidva.github.io/commit/ad039574431f8b74ad95665f0914448bb641c95a -->




https://github.com/WxHook/MMStructure


https://github.com/jonnermut/KSCrash/blob/master/Source/KSCrash/Recording/KSSystemInfo.m

<!-- 旧版登录失败 -->

用6.6.0登录完子之后再用6.5.8的覆盖安装,再重新登录一下

<!-- bundleID、uuid、jailbroken -->

+ (id) [KSSystemInfo systemInfo]  方法的返回值


    CFBundleExecutable = WeChat;
    CFBundleExecutablePath = "/var/mobile/Containers/Bundle/Application/DE497A13-E76F-42B8-B476-A9934B486EF4/WeChat.app/WeChat";
    CFBundleIdentifier = "com.tencent.xin";
    CFBundleName = WeChat;
    "app_uuid" = "AAAAA633-1E42-32DE-B943-2C16A47C7A3E";
    "cpu_arch" = arm64;
    "device_app_hash" = 9eb422144a96af8f91XXXXxxxxxdaf0d4742321b;
    jailbroken = 0;
    machine = "iPhone6,2";
    memory = { size = 1048576000; };
    "system_name" = "iPhone OS";
    "system_version" = "9.2.1";
    ... 
    后面省略一千个字段
    ...

<!-- sub_ 开头的一看就是 c 语言的函数 -->

调用 _dyld_image_count() 获得加载的动态库的数量,_dyld_get_image_name() 获得名字,然后遍历他们的名字,看看有没有 “MobileSubstrate” 关键字,有的话就是越狱的


#import <mach-o/dyld.h>  

int count = _dyld_image_count();
for (int i=0; i<count; i++) {
    printf("%s", _dyld_get_image_name(i));
    // 如果 _dyld_get_image_name() 里面包含 MobileSubstrate 就是越狱了
}


<!-- 用 + [KSSystemInfo isJailbroken] 来判断是否越狱的 -->

<!-- JailBreakHelper -->

继续往下看 - [JailBreakHelper IsJailBreak] 方法的代码,还原里面一个数组的代码大概是

NSArray *paths = @[
    @"/etc/ssh/sshd_config",
    @"/usr/libexec/ssh-keysign",
    @"/usr/sbin/sshd",
    @"/bin/sh",
    @"/bin/bash",
    @"/etc/apt",
    @"/Applications/Cydia.app/",
    @"/Library/MobileSubstrate/MobileSubstrate.dylib"];



http://www.bijishequ.com/authorarticle.html?author=ck2016

<!-- KSSystemInfo应该是闪退的时候上传的,有个类叫KSCrash -->

 KSCrash +(id)sharedInstance { return nil; }

KSCrash /KSCrash/KSCrash/KSSystemInfo.m: https://github.com/jonnermut/KSCrash


转载请注明: > KSSystemInfoJailBreakHelperWtloginPlatformInfo

在操作过程或者文章有问题的话欢迎在 原文 里提问或指正。

赞赏支持

取消

感谢您的支持,我会继续努力的!

扫码支持
扫码支持
扫码打赏,你说多少就多少
最近的文章

PowerfulClanSociety

前言 本文主要讲解豪族社会篇 正文 新的博客 see also…

OutlineOfChineseHistory继续阅读
更早的文章

launchApplicationWithIdentifier

前言 code:自动解锁以及打开特定的app lua代码实现解锁和打开特定app的代码 正文 launchApplicationWithIdentifier NSTimer *timer ;%hook SpringBoard//applicationDidFinishLaunching-(void)applicationDidFinishLaunching: (id)application{ %orig;//创建一个定时器,定时检测 ...…

iOSre继续阅读
更多