Remove ios anti-debugging and ios debugging
Reverse debugging is often encountered in the reverse process, as shown in the following code:
0008bd8e movs r1, #0xa ; argument #2 for method imp___symbolstub1__dlopen0008bd90 blx imp___symbolstub1__dlopen0008bd94 movw r1, #0xe1030008bd98 mov r6, r00008bd9a movt r1, #0x10 ; 0x10e103 (sub_10dfd8 + 0x12b)0008bd9e add r1, pc ; "ptrace", argument #2 for method imp___symbolstub1__dlsym0008bda0 blx imp___symbolstub1__dlsym0008bda4 mov r4, r00008bda6 movs r0, #0x1f0008bda8 movs r1, #0x00008bdaa movs r2, #0x00008bdac movs r3, #0x00008bdae blx r4
View Code
Find the ptrace function address in the dynamic Connection Library and call the ptrace function. During reverse debugging, you only need to modify the first parameter and change the value.
Can refer to this article: http://www.cnblogs.com/catch/p/3476280.html
Will be improved later