ios逆向

方法

将ipa文件后缀改成.zip,并解压

1747205821481-19cec022-8677-4174-9936-5b84f407b328.png

显示包内容,找到exec可执行文件,将其拖入64位IDA,

1747205856722-8fcbe5e0-4953-437d-935f-1d3f703558ba.png

例题

ipa(校赛)

后缀改成zip然后解压

将exec文件拖入ida反编译

1747206676676-b1a270f2-a557-4686-a42f-2db66f880c12.png

加载的时候没看到最上面的函数(所以说不能只盯着main函数看)

1747206965205-337d5f3e-4a3e-4c64-ad0e-520ead96d7e1.png

数据在src里面

1747207108017-1a3f6a32-9be5-438c-a7e2-8db30fa5da67.png

1
2
3
4
5
6
a='Ios'
miwen=[0x2F,0x3,0x12,0x2E,0x14,0x21,0x2C,0x19,0x16,0x3B,0x1C,0x16,0x16,0x9,0x43,0x3B,0x30,0x3A,0x79,0x1C,0x2C,0x78,0x1C,0x2C,0x0,0x1,0x7,0x2C,0x1D,0x16,0x3A,0x3B,0x1A,0x27,0x8,0xE]
#print(len(miwen))
for i in range(len(miwen)):
b=miwen[i]^ord(a[i%3])
print(chr(b),end='')

1747207305281-7bb2bab9-cc9b-4ca4-900b-35138d365388.png

更新: 2025-05-14 15:29:28
原文: https://www.yuque.com/chaye-apqbl/vsc85q/dncfi1ynxhaq4f5c


http://example.com/2026/01/19/RE/其他/ios逆向/
Author
chaye
Posted on
January 19, 2026
Licensed under