whatsapp的越狱特征检测

一、检测点
1、检测目录
opendir打开bin是否成功
2、检测模块
解析macho的header头获取加载的模块,获取进程的所有模块,判断是否包含如下模块:substrate,watusi,zdumper
3、检测文件
判定文件或是应用是否的路径是否存在
/Applications/Cydia.app,
/Applications/RockApp.app,
/Applications/Icy.app,
/usr/sbin/sshd,
/usr/bin/sshd,
/usr/libexec/sftp-server,
/Applications/WinterBoard.app,
/Applications/SBSettings.app,
/Applications/MxTube.app,
/Applications/IntelliScreen.app,
/Library/MobileSubstrate/DynamicLibraries/Veency.plist,
/Applications/FakeCarrier.app,
/Library/MobileSubstrate/DynamicLibraries/LiveClock.plist,
/private/var/lib/apt,
/Applications/blackra1n.app,
/private/var/stash,
/private/var/mobile/Library/SBSettings/Themes,
/System/Library/LaunchDaemons/com.ikey.bbot.plist,
/System/Library/LaunchDaemons/com.saurik.Cydia.Startup.plist,
/private/var/tmp/cydia.log,
/private/var/lib/cydia,
/private/var/lib/dpkg
4、检测函数
通过dlsym在模块中搜索函数符号,判断是否存在如下函数
MSHookProcess,MSGetImageByName,MSFindSymbol,MSHookFunction,MSHookMessage,MSHookMessageEx
二、whatsapp交流
1、完整实现ios脱机版本的。过很多坑中一个小坑,使用resumehandshake方式登录(fullhandshake不好收短信)

猜你喜欢

转载自blog.csdn.net/q2919761440/article/details/133975481