Reverse Engineering?

I have a * file . ipa , which is an iphone application.

  • Is it possible to use reverse engineering in that ipa and extract code ..?
+7
source share
3 answers

Well, it's not really hacking, but it can help you identify some parts of the user interface ... Do the following:

1- Create a new project on Xcode (in fact, this is not what you choose)

2- Connect the device to the computer.

3 Profile the project on your device.

4- In the profile, select Core Animation.

5- In the options, select Color blending layers. It will look like this: enter image description here

6- Turn off the device while the profile is running. Your phone will now look like this:

enter image description here

7- Go to the application you want to check.

Although you cannot see the code, it can help you identify key parts of the application. To return to normal operation, you can reboot the device or simply go to the profile and start it again and uncheck the Color mixed layers box.

+3
source

As stated here: How to use Xcode to open decrypted IPA ipa content is just a "stuck" version of the executable.

So, if you can extract, this is basically a problem of disassembling the executable (assembly code / dissasemblers).

But for some reason it smells like fish.

0
source

Impossible how you intend it! .ipa files contain resources (images, sound files, database files, etc.) and only compiled classes. The code is contained in these compiled classes as binary files and, thus, you can see how the application was structured into classes and how resources were used, but cannot get the actual code written by the developers. You can refer to this SO question for a brief idea of ​​how this can be done.

0
source

All Articles