Unity3d 4.6.1 MacOS Hack process:
1.4.6.0 license files downloaded on the Internet Unity_v4.x.ulf
2. CP Unity_v4.x.ulf "/Library/Application Support/unity/unity_v4.x.ulf"
A. Using LLDB to crack the command line
1. cd/applications/unity/unity.app/contents/macos/
2. Lldb Unity
3. B Main
4. R
5. B dsigsignature::verify
6. Finish
7. Register write EAX 1
B. Modify Libxml-security-c.dylib, Permanent patch
1. Original Location ASM code:
__text:000143e0. Ebp
__text:000143e1 E5 mov ebp, esp
__TEXT:000143E3-EC-sub ESP, 28h
__text:000143e6 5D F4 mov [ebp+var_c], ebx
__text:000143e9 F8 mov [ebp+var_8], ESI
__text:000143ec 7D FC mov [ebp+var_4], EDI
__text:000143ef E8-XX-$+5
__text:000143f4 5B pop ebx
__text:000143f5 8B 7D mov edi, [ebp+arg_0]
__TEXT:000143F8 7F cmp byte ptr [edi+4], 0
__TEXT:000143FC JNZ Short loc_14450
__text:000143fe C7 (XX), MOV dword ptr [ESP], 8
__text:00014405 E8 B2, call ___cxa_allocate_exception
__text:0001440a C7 mov edi, eax
__text:0001440c 8D D4 eax, (adsigsignaturev-143f4h) [EBX]; "Dsigsignature::verify () called Prior to" ...
__text:00014412, MOV [esp+8], eax
Switch
. text:000143e0 B0 mov al, 1
. text:000143e2 C3 Retn
That is, the E5 changed to B0 C3
2. Save the file
3.CP Libxml-security-c.dylib/applications/unity/unity.app/contents/frameworks/libxml-security-c.dylib
Unity3d 4.6.1 MacOSX hack